CERTIFIED-IN-CYBERSECURITY · Question #779
CERTIFIED-IN-CYBERSECURITY Question #779: Real Exam Question with Answer & Explanation
The correct answer is C: Denial of Service. A denial of service attack (DoS) compromises the availability of a system or service through a malicious overload of requests, thereby activating safety mechanisms that delay or limit the availability of that system or service. As a result, systems or services become temporarily
Question
Which type of attack PRIMARILY aims to consume all the available resources, thereby making an organization's service inaccessible to its intended users?
Options
- APhishing
- BCross-Site Scripting
- CDenial of Service
- DTrojans
Explanation
A denial of service attack (DoS) compromises the availability of a system or service through a malicious overload of requests, thereby activating safety mechanisms that delay or limit the availability of that system or service. As a result, systems or services become temporarily inaccessible to their intended users (see ISC2 Study Guide, chapter 4, module 2). Trojans, phishing and cross-site scripting attacks try to gain access to the system or data covertly, and therefore do not primarily aim at compromising the system's availability.
Topics
Community Discussion
No community discussion yet for this question.