nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #26

CERTIFIED-IN-CYBERSECURITY Question #26: Real Exam Question with Answer & Explanation

The correct answer is D: Exhaustion of device resources. A denial of service attack (DoS) consists in a malicious overload of requests which will eventually lead to the exhaustion of resources, rendering the service unavailable, as well as causing the activation of safety mechanisms that delay or limit the availability of that system o

Security Principles

Question

What is the consequence of a Denial of Service attack?

Options

  • AIncrease in the availability of resources
  • BMalware Infection
  • CRemote control of a device
  • DExhaustion of device resources

Explanation

A denial of service attack (DoS) consists in a malicious overload of requests which will eventually lead to the exhaustion of resources, rendering the service unavailable, as well as causing the activation of safety mechanisms that delay or limit the availability of that system or service. This type of attack seeks to compromise service availability, but not to control a device nor to install

Topics

#Denial of Service (DoS)#Cybersecurity attacks#Attack consequences#Availability

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions