PdfPrep.com

A hacker initiates so many invalid requests to a cloud network host that the host uses all its resources responding to invalid requests and ignores the legitimate requests. Identify the type of attack

A hacker initiates so many invalid requests to a cloud network host that the host uses all its resources responding to invalid requests and ignores the legitimate requests. Identify the type of attack
A . Denial of Service (DoS) attacks
B . Side Channel attacks
C . Man-in-the-middle cryptographic attacks
D . Authentication attacks

Answer: A

Exit mobile version