Question:

Identify the concept behind the below-given scenario: “If an attacker limits or stops an authorized user to access a service, device or any such resource by overloading that resource with illegitimate requests.”

Show Hint

Use firewalls, intrusion detection systems, and traffic filtering to reduce the impact of DoS/DDoS attacks.
Updated On: Sep 18, 2025
  • Snooping
  • Eavesdropping
  • Denial of Service
  • Plagiarism
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is C

Solution and Explanation

Step 1: Definition of Denial of Service (DoS).
A DoS attack occurs when attackers flood a server, network, or service with excessive requests, exhausting its resources, and making it unavailable to legitimate users.
Step 2: Analyze options.
- Option 1: Snooping → Refers to unauthorized access to private data, not overloading services.
- Option 2: Eavesdropping → Refers to secretly listening to communication, not denying service.
- Option 3: Denial of Service → Correct → Overloading resources with illegitimate requests to prevent access.
- Option 4: Plagiarism → Irrelevant, refers to copying content.

Step 3: Clarification.
A more advanced form is Distributed Denial of Service (DDoS), where multiple compromised systems simultaneously attack a single target, making mitigation harder.
Final Answer: \[ \boxed{\text{Denial of Service (DoS) attack}} \]
Was this answer helpful?
0
0

Questions Asked in CUET exam

View More Questions