
BTEC DIT - C3 - Denial of Service (DoS DDoS) Attacks
Authored by J Blakley
Computers
11th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common external threat to systems and websites?
Password theft
Phishing scam
Denial of Service attack
Malware infection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a Denial of Service attack work?
By impersonating legitimate users
By encrypting files for ransom
By stealing user data
By flooding a server with malicious requests
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal of a Denial of Service attack?
To install malware on the server
To overload the server so it stops working
To steal sensitive information
To gain unauthorized access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is considered a legitimate user in the example provided?
The server
The attacker
Alice
Mallory
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens to legitimate users during a Denial of Service attack?
They are granted unauthorized access
They receive faster service
Their information is stolen
They may not receive any response from the server
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a DDoS attack?
Direct Denial of Service
Distributed Denial of Service
Dedicated Denial of Service
Dynamic Denial of Service
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How is a DDoS attack different from a DoS attack?
It is easier to stop
It targets only individual users
It comes from multiple sources
It is less powerful
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?