Which of the following BEST describes this type of attack?

When examining HTTP server logs the security administrator notices that the company’s online
store crashes after a particular search string is executed by a single external user. Which of the
following BEST describes this type of attack?

When examining HTTP server logs the security administrator notices that the company’s online
store crashes after a particular search string is executed by a single external user. Which of the
following BEST describes this type of attack?

A.
Spim

B.
DDoS

C.
Spoofing

D.
DoS

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *