Multiple Choice
MATCHING
-An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all,and normal traffic is blocked
A) auditing
B) biometrics
C) DMZ
D) DDoS attack
E) packet filters
F) port
G) RBAC
H) signatures
I) socket
J) worm
Correct Answer:

Verified
Correct Answer:
Verified
Q39: List and describe two motivations attackers have
Q40: What is a script kiddie?
Q41: Malware that creates networks of infected computers
Q42: Which security layer verifies the identity of
Q43: A worm creates files that copy themselves
Q45: Reviewing log files is a time-consuming task
Q46: What is malicious port scanning and how
Q47: What is virus scanning and how does
Q48: With which access control method do system
Q49: _ is the capability to prevent a