1.

The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________(a) Distributed Denial-of-Service (DDoS)(b) Permanent Denial-of-Service (PDoS)(c) Denial-of-Service (DoS)(d) Controlled Denial-of-Service (CDoS)The question was asked by my school principal while I was bunking the class.My enquiry is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct answer is (a) Distributed Denial-of-Service (DDoS)

To elaborate: Here the attacker USES MULTIPLE PCS and floods the bandwidth/resources of the VICTIM’s system, (usually 1 or MANY web-servers). The attack uses zombie PCs and each of the PC’s are remotely controlled by the attacker.



Discussion

No Comment Found

Related InterviewSolutions