A hacker initiates so many invalid requests to a cloud network host that the host uses all its resources responding to invalid requests and ignores the legitimate requests. Identify the type of attack

Posted by: Pdfprep Category: ECSAv10 Tags: , ,

A hacker initiates so many invalid requests to a cloud network host that the host uses all its resources responding to invalid requests and ignores the legitimate requests. Identify the type of attack
A . Denial of Service (DoS) attacks
B . Side Channel attacks
C . Man-in-the-middle cryptographic attacks
D . Authentication attacks

Answer: A

Leave a Reply

Your email address will not be published.