
Denial of Service
Authored by LINDSAY FABIAN
Computers
Professional Development
Used 42+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 3 pts
______ __ _______ a single attacker or a single system is used to flood a target computer system, network, or website with an overwhelming amount of traffic, requests, or malicious activities.
(a)
2.
FILL IN THE BLANK QUESTION
1 min • 3 pts
can effectively prevents attackers from launching simple flooding type attacks from machines behind the firewall.
(a)
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
(a) is a malicious attempt by a single person or group of people to cause the victim, site or node to deny service to its customers.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
some switches provide automatic and/or system wide rate limiting, traffic shaping, delayed binding to detect DOS Attacks.
(a)
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
(a) a multiple compromised computers, often referred to as "bots" or "zombies," are coordinated to launch an attack on a target simultaneously.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter.
(a)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The primary goal: to overwhelm the target's resources and disrupt its normal operation. However, the scale and complexity of attacks are typically much greater.
DoS
DDoS
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?