Which of the following attack types does this BEST describe?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A security administrator has received multiple calls from the help desk about customers who are unable to access the organization’s web server. Upon reviewing the log files the security administrator determines multiple open requests have been made from multiple IP addresses, which is consuming system resources.

Which of the following attack types does this BEST describe?
A . DDoS
B . DoS
C . Zero day
D . Logic bomb

Answer: A

Leave a Reply

Your email address will not be published.