Question:medium

A scenario wherein a hacker limit or stop an authorised used to access service, device or other resource by overloading that resource with illegitimate request -

Updated On: Feb 21, 2026
  • DOS (Denial of Service)
  • Spoofing
  • Eavesdropping
  • Gray hats
Show Solution

The Correct Option is A

Solution and Explanation

The correct option is (A) :DOS (Denial of Service).
Was this answer helpful?
0

Top Questions on Commands and Requests