InterviewSolution
Saved Bookmarks
| 1. |
The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________(a) Distributed Denial-of-Service (DDoS)(b) Permanent Denial-of-Service (PDoS)(c) Denial-of-Service (DoS)(d) Controlled Denial-of-Service (CDoS)The question was asked by my school principal while I was bunking the class.My enquiry is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct answer is (a) Distributed Denial-of-Service (DDoS) |
|