<< Prev Question Next Question >>

Question 6/20

A threat analyst obtains an intelligence related to a threat, where the data is sent in the form of a connection request from a remote host to the server. From this data, he obtains only the IP address of the source and destination but no contextual information. While processing this data, he obtains contextual information stating that multiple connection requests from different geo-locations are received by the server within a short time span, and as a result, the server is stressed and gradually its performance has reduced. He further performed analysis on the information based on the past and present experience and concludes the attack experienced by the client organization.
Which of the following attacks is performed on the client organization?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (20q)
Question 1: Mr. Bob, a threat analyst, is performing analysis of competi...
Question 2: H&amp;P, Inc. is a small-scale organization that has decided...
Question 3: Sarah is a security operations center (SOC) analyst working ...
Question 4: During the process of threat intelligence analysis, John, a ...
Question 5: Kathy wants to ensure that she shares threat intelligence co...
Question 6: A threat analyst obtains an intelligence related to a threat...
Question 7: Alice, an analyst, shared information with security operatio...
Question 8: A team of threat intelligence analysts is performing threat ...
Question 9: Tim is working as an analyst in an ABC organization. His org...
Question 10: Henry. a threat intelligence analyst at ABC Inc., is working...
Question 11: Which of the following components refers to a node in the ne...
Question 12: John, a professional hacker, is trying to perform APT attack...
Question 13: Andrews and Sons Corp. has decided to share threat informati...
Question 14: An analyst wants to disseminate the information effectively ...
Question 15: A network administrator working in an ABC organization colle...
Question 16: What is the correct sequence of steps involved in scheduling...
Question 17: Sam works as an analyst in an organization named InfoTech Se...
Question 18: An XYZ organization hired Mr. Andrews, a threat analyst. In ...
Question 19: An attacker instructs bots to use camouflage mechanism to hi...
Question 20: Miley, an analyst, wants to reduce the amount of collected d...