Question:medium

Identify the concept behind the below-given scenario: “If an attacker limits or stops an authorized user to access a service, device or any such resource by overloading that resource with illegitimate requests.”

Show Hint

Use firewalls, intrusion detection systems, and traffic filtering to reduce the impact of DoS/DDoS attacks.
Updated On: Feb 15, 2026
  • Snooping
  • Eavesdropping
  • Denial of Service
  • Plagiarism
Show Solution

The Correct Option is C

Solution and Explanation

Step 1: Defining Denial of Service (DoS).
A DoS attack is executed when attackers overwhelm a server, network, or service with an excessive volume of requests, thereby depleting its resources and rendering it inaccessible to legitimate users.
Step 2: Examining the Options.
- Option 1: Snooping → Pertains to unauthorized access of private information, not service overload.
- Option 2: Eavesdropping → Relates to covertly monitoring communications, not service denial.
- Option 3: Denial of Service → Correct → Involves overwhelming resources with illegitimate requests to block access.
- Option 4: Plagiarism → Unrelated, concerns the appropriation of content.

Step 3: Further Elaboration.
A more sophisticated variant is Distributed Denial of Service (DDoS), wherein numerous compromised systems concurrently target a single entity, significantly complicating defense efforts.
Conclusion: \[\boxed{\text{Denial of Service (DoS) attack}}\]
Was this answer helpful?
0


Questions Asked in CUET (UG) exam