Solveeit Logo

Question

Informatics Practices Question on Commands and Requests

A scenario wherein a hacker limit or stop an authorised used to access service, device or other resource by overloading that resource with illegitimate request -

A

DOS (Denial of Service)

B

Spoofing

C

Eavesdropping

D

Gray hats

Answer

DOS (Denial of Service)

Explanation

Solution

The correct option is (A) :DOS (Denial of Service).