Denial - of - service attack includes:
a) a type of attack on a network that is designed to bring the network to its knees by flooding
it
with useless traffic
b) DoS attacks are included in it.
c) Both of Above
d) None of These

1 Answer

Answer :

c) Both of Above

Related questions

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off

Last Answer : c. To overload a system so it is no longer operational

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Itunes on NDAS, recently experiencing large network traffic increase, flooding.

Last Answer : First of all; it's unlikely that this activity is hurting anything or degrading performance on your network. (If it's bogging down your computer, then you might have issues in the computer itself: low RAM, ... , but now it will only do it when you load it into your computer. Hope this is helpful.

Description : Explain denial of service attack. -Technology

Last Answer : A denial of service attack is a type of attack that consumes all the resources of a computer.

Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack

Last Answer : c) Patent

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Which of the following applies to the implementation of an idea? a. Copyright b. Intellectual property c. Patent d. Denial‐of‐service attack

Last Answer : c. Patent

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack

Last Answer : (B) Replay Attack

Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack

Last Answer : (A) Denial of service attack 

Description : Select the most appropriate option for the below two statements. I. A Dos attack can take down your internet connection II. A Dos attack can take down your entire system a. Both I and II are true b. I is true II is false c. I is false II is True d. Both I and II are false

Last Answer : a. Both I and II are true

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003

Last Answer : 4) Windows 2003

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003

Last Answer : 4 Windows 2003

Description : Dams are designed to reduce flooding by ____________. a) Protecting river banks from erosion b) Providing storage for flood water c) Increasing the downstream velocity of flood water ‘ d) Trapping sediment behind the dam so it can't be deposited downstream

Last Answer : b) Providing storage for flood water

Description : Channelization of streams is designed to reduce flooding by ___________. a) Speeding the passage of floodwaters b) Reducing bank erosion c) Slowing down river velocity so as to reduce damage d) Increase the meandering of streams

Last Answer : a) Speeding the passage of floodwaters

Description : Dams are designed to reduce flooding by _______________. a) Protecting river banks from erosion b) Providing storage for flood water c) Increasing the downstream velocity of flood water d) Trapping sediment behind the dam so it can't be deposited downstream

Last Answer : b) Providing storage for flood water

Description : If another country were to attack the United States with something like EMP (Electromagnetic Pulse) bombs and they effectively rendered most computers, automobiles, and computer assisted devices useless, would it spell complete doom for the country?

Last Answer : I would actually love to see this happen. It isn’t going back to the “dark ages.” It is going back to 1940.

Description : Motor name plate data includes '°°C rise'. This indicates the _____________. A. actual running temperature of the winding from no load to full load B. permissible temperature rise ... above normal full load operating temperature D. maximum allowable temperature rise for continuous no load service

Last Answer : Answer: B

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : Why the Germans were attack and defeat France then attack Russia immediately afterwards. Trench warfare stalemated the attacks in France was count Alfred Von Schlieffen plan?

Last Answer : This is a essay assignment and we don’t do essays. You also havea two question statement here. You need to answer thisquestion.

Description : The US stopped cultivating ties with Taliban regime in Afghanistan after— (1) 9/11 attacks in the US (2) attacks on US embassies in Kenya and Tanzania (3) attack on US military mission headquarter in Riyadh (4) failures of talks on gas pipeline through Afghanistan

Last Answer : (2) attacks on US embassies in Kenya and Tanzania Explanation: The US stopped cultivating ties with Taliban Regime in Afghanistan after attack on US embassies in Kenya and Tanzania in1998.

Description : A 35-year-old male presented with an attack of acute gout. He was treated with a 10 day course of naproxen. His blood uric acid level is high. What future line of treatment is ... treatment with allopurinol D. Start with allopurinol + naproxen for 2 months followed by long-term allopurinol treatment

Last Answer : D. Start with allopurinol + naproxen for 2 months followed by long-term allopurinol treatment

Description : Select the correct statement in relation to drug therapy of migraine: A. Simple analgesics like paracetamol are ineffective in migraine B. Ergot alkaloids are used for prophylaxis as well as treatment ... resistant cases D. Ergot alkaloids should be given till 24 hours after an attack has subsided

Last Answer : C. Use of ergot alkaloids is restricted to severe or resistant cases

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : A station in a network forwards incoming packets byplacing them on its shortest output queue. Whatrouting algorithm is being used? A. hot potatorouting B. flooding C. static routing D. delta routing E. None of the above

Last Answer : hot potatorouting

Description : Where would network testing be included in an IP packet? * IP Options field * Identification field * Type of Service field * Reservation field

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Which type of commands in DOS needs additional files for their execution? 1) Internal Commands 2) External Commands 3) Batch Commands 4) Redirector

Last Answer : 2) External Commands

Description : Which type of commands in DOS needs additional files for their execution? 1 Internal Commands 2 External Commands 3 Batch Commands 4 Redirectors

Last Answer : 2 External Commands

Description : . ________________ is yet another service model, which includes Network-as-a-Service, Business-as-a-Service, Identity-as-a-Service, Database-as-a-Service or Strategy-as-a-Service. A. IaaS B. PaaS C. SaaS D. XaaS

Last Answer : . XaaS

Description : When you deploy an application on Google’s PaaS App Engine cloud service, the Administration Console provides you with the which of the following monitoring capabilities? a) View data and error logs b) Analyze your network traffic c) View the application’s scheduled tasks d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following are true about firewalls? 1) Filters network traffic 2) Can be either a hardware or software device 3) Follows a set of rules 4) All the above

Last Answer : 4) All the above

Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above

Last Answer : 4 All the above

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Point out the correct statement. a) Google's cloud includes perhaps some 10 data centers worldwide b) Flipkart.com's infrastructure was built to support elastic demand so the system could accommodate ... ) Data centers have been sited to optimize the overall system latency d) All of the mentioned

Last Answer : Data centers have been sited to optimize the overall system latency

Description : Traffic engineering only includes (A) Planning of regulatory measures (B) Design and application of control devices (C) Analysis of traffic characteristics (D) All the above

Last Answer : Answer: Option D

Description : Which of the following statements reflects information to be included when teaching the patient about plantar fasciitis? a) Management of plantar fasciitis includes stretching exercises. ... Complications of plantar fasciitis include neuromuscular damage and decreased ankle range of motion.

Last Answer : a) Management of plantar fasciitis includes stretching exercises. Management also includes wearing shoes with support and cushioning to relieve pain, orthotic devices (e.g., heel cups, arch supports), and the use of non-steroidal anti-inflammatory drugs (NSAIDs).

Description : Asking the patient questions to determine if the person understands the health teaching provided would be included during which step of the nursing process? a) Evaluation Evaluation includes observing ... ) Implementation Implementation is the step during which the teaching plan is put into action.

Last Answer : a) Evaluation Evaluation includes observing the person, asking questions, and comparing the patient’s behavioral responses with the expected outcomes.

Description : Bill is furious when he reads the invoice since it includes £50 in shipping charges and he had assumed that the price quoted by the seller had included these charges. Bob should have checked that ... were: A)FOB factory price B)base point price C)freight absorption price. D)FOB destination price.

Last Answer : D)FOB destination price.