PrepAway - Latest Free Exam Questions & Answers

Which of the following methods will you perform to accomplish the task?

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

PrepAway - Latest Free Exam Questions & Answers

A.
Look for core files or crash dumps on the affected systems.

B.
Seize all computers and transfer them to the Forensic lab.

C.
Sniff network traffic to the failing machine.

D.
Look for unusual traffic on Internet connections and network segments.

Explanation:
The following methods are used to investigate the DoS attacks. Sniff network traffic to the failing machine. Look for unusual traffic on Internet connections and network segments. Look for core files or crash dumps on the affected systems.

Answer B is incorrect. This method is not used to investigate the DoS attack. Fact What is a Denial-of-Service (DoS) attack? Hide A Denial-of- Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as a network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to the network. The effects of a DoS attack are as follows. Saturates network resources Disrupts connections between two computers, thereby preventing communications between services Disruptsservices to a specific computer Causes failure to access a Web site Results in an increase in the amount of spam A Denial-of-Service attack is very common on the Internet because it is much easier to accomplish. Most of the DoS attacks rely on the weaknesses in the TCP/IP protocol.


Leave a Reply