Determine the types of attacks below by selecting an option from the dropdown list.
Which of the following attacks is occurring?
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs
show repeated connection attempts from the following IPs:
10.10.3.16
10.10.3.23
212.178.24.26
217.24.94.83
These attempts are overloading the server to the point that it cannot respond to traffic. Which of
the following attacks is occurring?
A distributed denial of service attack can BEST be described as:
A distributed denial of service attack can BEST be described as:
A distributed denial of service attack can BEST be described as:
A distributed denial of service attack can BEST be described as:
The administrator suspects that:
An administrator notices an unusual spike in network traffic from many sources. The administrator
suspects that:
The administrator suspects that:
An administrator notices an unusual spike in network traffic from many sources. The administrator
suspects that:
Which of the following will BEST mitigate the risk if implemented on the switches?
A security technician at a small business is worried about the Layer 2 switches in the network
suffering from a DoS style attack caused by staff incorrectly cabling network connections between
switches.
Which of the following will BEST mitigate the risk if implemented on the switches?
Which of the following is the MOST likely cause?
An administrator is assigned to monitor servers in a data center. A web server connected to the
Internet suddenly experiences a large spike in CPU activity. Which of the following is the MOST
likely cause?
Which of the following attacks could be used to initiate a subsequent man-in-the-middle attack?
Which of the following attacks could be used to initiate a subsequent man-in-the-middle attack?
which of the following attacks?
A network analyst received a number of reports that impersonation was taking place on the
network. Session tokens were deployed to mitigate this issue and defend against which of the
following attacks?