nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #779

CERTIFIED-IN-CYBERSECURITY Question #779: Real Exam Question with Answer & Explanation

The correct answer is C: Denial of Service. A denial of service attack (DoS) compromises the availability of a system or service through a malicious overload of requests, thereby activating safety mechanisms that delay or limit the availability of that system or service. As a result, systems or services become temporarily

Security Principles

Question

Which type of attack PRIMARILY aims to consume all the available resources, thereby making an organization's service inaccessible to its intended users?

Options

  • APhishing
  • BCross-Site Scripting
  • CDenial of Service
  • DTrojans

Explanation

A denial of service attack (DoS) compromises the availability of a system or service through a malicious overload of requests, thereby activating safety mechanisms that delay or limit the availability of that system or service. As a result, systems or services become temporarily inaccessible to their intended users (see ISC2 Study Guide, chapter 4, module 2). Trojans, phishing and cross-site scripting attacks try to gain access to the system or data covertly, and therefore do not primarily aim at compromising the system's availability.

Topics

#Denial of Service (DoS)#Cybersecurity attacks#Attack types#Availability

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions