CiscoCisco
200-201 · Question #177
200-201 Question #177: Real Exam Question with Answer & Explanation
The correct answer is D: denial-of-service. A denial-of-service attack directly represents the evasion technique of resource exhaustion by overwhelming a system with requests, making services unavailable to legitimate users.
Submitted by jakub_pl· Mar 6, 2026Security Concepts
Question
Which attack represents the evasion technique of resource exhaustion?
Options
- ASQL injection
- Bman-in-the-middle
- Cbluesnarfing
- Ddenial-of-service
Explanation
A denial-of-service attack directly represents the evasion technique of resource exhaustion by overwhelming a system with requests, making services unavailable to legitimate users.
Common mistakes.
- A. SQL injection focuses on exploiting vulnerabilities in database input fields to gain unauthorized access to or manipulate data, not primarily to exhaust system resources.
- B. A man-in-the-middle attack involves an attacker secretly relaying and possibly altering communication between two parties who believe they are directly communicating with each other, rather than exhausting resources.
- C. Bluesnarfing is a Bluetooth attack that allows an attacker to access information on a device, such as calendars, contacts, and emails, without the owner's knowledge or permission, and is not a resource exhaustion technique.
Concept tested. Denial-of-service and resource exhaustion
Reference. https://learn.microsoft.com/en-us/azure/security/fundamentals/ddos-attack-best-practices
Topics
#denial of service#resource exhaustion#attack types
Community Discussion
No community discussion yet for this question.