Question
Informatics Practices Question on Commands and Requests
A scenario wherein a hacker limit or stop an authorised used to access service, device or other resource by overloading that resource with illegitimate request -
A
DOS (Denial of Service)
B
Spoofing
C
Eavesdropping
D
Gray hats
Answer
DOS (Denial of Service)
Explanation
Solution
The correct option is (A) :DOS (Denial of Service).