COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following elements is most likely to be an issue for Ping flood?
A
Confidentiality
B
Integrity
C
Availability
D
Non-repudiation.
Explanation: 

Detailed explanation-1: -An Internet Control Message Protocol (ICMP) flood attack is a common distributed denial-of-service (DDoS) attack where malicious actors try to overwhelm a server or network device with ICMP pings, or echo-request packets. Typically, ICMP pings are used to determine the health of a device and the connection to it.

Detailed explanation-2: -Common DDoS attacks types. A UDP flood, by definition, is any DDoS attack that floods a target with User Datagram Protocol (UDP) packets.

There is 1 question to complete.