From the list below, choose the exploit that can be considered a DoS attack because more traffic than what the node can handle is flooded to that node.

From the list below, choose the exploit that can be considered a DoS attack because more traffic
than what the node can handle is flooded to that node.

From the list below, choose the exploit that can be considered a DoS attack because more traffic
than what the node can handle is flooded to that node.

A.
Ping of death

B.
Logic bomb

C.
Buffer overflow

D.
Smurf attack

Explanation:

Buffer overflows occur when an application receives more data than it is programmed to accept.
This situation can cause an application to terminate. The termination may leave the system
sending the data with temporary access to privileged levels in the attacked system.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 135



Leave a Reply 0

Your email address will not be published. Required fields are marked *