PrepAway - Latest Free Exam Questions & Answers

Which of the following methods will you perform to accomplish the task?

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

PrepAway - Latest Free Exam Questions & Answers

A.
Sniff network traffic to the failing machine.

B.
Seize all computers and transfer them to the Forensic lab.

C.
Look for unusual traffic on Internet connections and network segments.

D.
Look for core files or crash dumps on the affected systems.

Explanation:
The following methods are used to investigate the DoS attacks:
Sniff network traffic to the failing machine.Look for unusual traffic on Internet connections and network segments.Look for core files or crash dumps on the affected systems. Answer option B is incorrect. This method is not used to investigate the DoS attack.
What is a Denial-of-Service (DoS) attack?
A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as a network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to the network. The effects of a DoS attack are as follows:
Saturates network resources Disrupts connections between two computers, thereby preventing communications between services
Disrupts services to a specific computerCauses failure to access a Web site Results in an increase in the amount of spam A Denial-of-Service attack is very common on the Internet because it is much easier to accomplish. Most of the DoS attacks
rely on the weaknesses in the TCP/IP protocol.

One Comment on “Which of the following methods will you perform to accomplish the task?


Leave a Reply