When hackers flood a website with useless traffic to overwhelm the network, it is called

CareerCadets.com is a community driven website, you can freely participate, invite friends and add content.

Cookies: We use cookies to improve your experience on our site.Read privacy policy for more information.

Try the new Google Books

Check out the new look and enjoy easier access to your favorite features

When hackers flood a website with useless traffic to overwhelm the network, it is called

Categories: Management

  • 1) phishing
  • 2) pharming
  • 3) a Denial of Service (DoS) attack
  • 4) spoofing
Answer

Answer 3) a Denial of Service (DoS) attack

Yes! You can do Online MCQ practice of E-Business question set and give online exam quiz test for E-Business, so you can check your knowledge. You can get MCQ Study and Exam link from home page.

Share

Tags: E-Business

Question:Directors may not be disqualified for Option A.continuing to trade when the company is insolventOption…

Question:Which of the following is not one the underlying principles of the corporate governance Combined…

Question:The view that business exists at society's pleasure and businesses should meet public expectations of…

Question:An organisation's obligation to act to protect and improve society's welfare as well asits own…

Question:The hand-of-government refers to the Option A.ability of the government to interfere in business negotiationsOption…

Question:Successful global initiatives addressing standards for business must begin and end with: Option A.the role…

Rahul Asked :

ECommerce

A. phishing B. pharming C. a Denial of Service (DoS) attack D. spoofing



Dapzoi

When hackers flood a website with useless traffic to overwhelm the network, it is called

Answer: Option C

Explanation:

When hackers flood a Web site with useless traffic to overwhelm the network, it is called a Denial of Service (DoS) attack. A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

Submit Your Comment


Which of the following is a characteristic of a firewall?

When you purchase copyrighted software, what actually are you paying for?

When hackers flood a Web site with useless traffic to overwhelm the network it is called .... a) phishing b) pharming c) a Denial of Service (DoS) attack d) spoofing

Ans. c) a Denial of Service (DoS) attack

Redundant navigation refers to ..... a) pages that work, load quickly, and point the customer toward your product offerings b) simple, fool-proof navigation c) a site working with the most popular browsers d) alternative navigation to the same content

Ans. d) alternative navigation to the same content

The most widely used encryption standard is ..... a) Advanced Encryption Standard (AES) b) Data Encryption Standard (DES) c) Universal Encryption Standard (UES) d) Optimal Encryption Standard (OES)

Ans. a) Advanced Encryption Standard (AES)

What Web server functionality allows it verify usernames and passwords and process certificates and encryption information? a) Processing of HTTP requests b) File Transfer Protocol c) Data capture d) Security services

Ans. d) Security services

When hackers flood a Web site with useless traffic to overwhelm the network it is called .... a) phishing b) pharming c) a Denial of Service (DoS) attack d) spoofing

Ans. c) a Denial of Service (DoS) attack

Which of the following is not a widely used midrange or high-end e-commerce suite ? a) Microsoft Commerce Server b) WebTrends Marketing Lab2 c) IBM WebSphere Commerce d) Broadvision Commerce

Ans. a) Microsoft Commerce Server

Malicious hackers who act with the intention of causing harm are .... a) White hats b) Black hats c) Grey hats. d) Brown hats

Ans. b) Black hats

The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ... a) hardware platform b) content platform c) transaction platform d) scalability platform

Ans. a) hardware platform

The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as ... a) Active Server Pages (ASP) b) Java Server Pages (JSP) c) Common Gateway Interface (CGI) d) VBScript

Ans. c) Common Gateway Interface (CGI)

A security plan begins with a(n) is ..... a) security policy b) risk assessment c) implementation plan d) security organization

Ans. b) risk assessment

E-commerce merchant server software includes all of the following except ..... a) online e-mail b) online catalog c) online shopping cart d) online credit card processing.

Ans. a) online e-mail

Firewalls perform all of the following functions except .... a) Forbids communications from untrustworthy sources b) Allows communications from trustworthy sources c) Eliminates viruses and other malicious attacks d) Filters traffic based on packet attributes

Ans. c) Eliminates viruses and other malicious attacks

In the e-commerce security environment which of the following constitutes the inner-most layer ? a) people b) data c) technology solutions d) organizational policies and procedures.

Ans. b) data

The dominant Web server software is .... a) Zeus b) Apache c) Microsoft IIS d) Google

Ans. b) Apache

A worm is designed to spread ..... a) from computer to computer b) from file to file on a computer c) from Web site to Web site d) from Web site to computer

Ans. a) from computer to computer

The most common form of securing channels is through ..... a) S-HTTP b) VPNs c) SSL d) PPTP

Ans. c) SSL

The most common type of Internet crime according to the IC3 is .. a) Credit card fraud. b) Check fraud c) Non-delivery d) Auction fraud

Ans. d) Auction fraud

All of the following are major categories of computer viruses except .... a) Macro viruses b) File-infecting viruses c) Script viruses d) Trojan viruses

Ans. d) Trojan viruses

The ability to change the product to better fit the needs of the customer is called ..... a) customization b) personalization c) privacy d) accessibility

Ans. a) customization

All of the following are tools for optimizing a Web site's location in search engine listings except ..... a) keywords and page titles b) identifying market niches c) buying ads d) benchmarking

Ans. d) benchmarking

Which of the following is not a dimension of e-commerce security provided by encryption ? a) availability b) message integrity c) nonrepudiation d) confidentiality

Ans. a) availability