____________ attacks use multiple compromised systems as sources of attack traffic, exploiting a victim system such as a server.

  • Cross-site scripting
  • DDoS
  • Man-in-the-middle (MitM)
  • SQL injection
Distributed Denial of Service (DDoS) attacks involve multiple compromised systems coordinated to flood a target with traffic, overwhelming its capacity. These attacks disrupt services and make systems inaccessible. Recognizing the characteristics of DDoS attacks is crucial for implementing mitigation strategies and ensuring the availability of online services in the face of such threats.__________________________________________________
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *