Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.

Posted by: Pdfprep Category: 212-89 Tags: , ,

Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.
A . URL Manipulation
B . XSS Attack
C . SQL Injection
D . Denial of Service Attack

Answer: D

Leave a Reply

Your email address will not be published.