DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1
Av
oid
sen
siti
ve
dat
a in
pu
blic
Wi-
Fi
or
co
mp
ute
rs.

D e n i a l - o f - s e r v i c e ( D o S ) a t t a c k
A threat actor sends multiple requests that
flood the server or networks with traffic to
exhaust resources and bandwidth. As the
system performance degrades, the system
becomes more and more nonresponsive, and
legitimate requests are left unfulfilled. These
kinds of attacks can be coordinated, with
multiple devices launching attacks at the
same time. Such an attack is known as a
distributed denial-of-service (DDoS) attack.


Us
e
spe
cial
ly
des
ign
ed
pro
tect
ion
ser
vic
es
(cl
ou
d
or
net
wo
rk).

C
r
o
s


An attacker attaches to a legitimate website
code that will execute when the victim loads
that website. This is the typical process: Valida
te
Free download pdf