answersLogoWhite

0


Best Answer

DOS

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which type of attack denies authorized user's access to network resources?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What kind of attack that the attacker is able to access administrator-level resources as a result?

Privilege escalation


What attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network?

Dictionary attack


Overloading a network to keep users out is considered what?

A denial of service attack. (DoS) This type of attack includes a variety of methods for denying legitimate users access to a network. A Distributed Denial of Service attack (DDos) is more specific type of DoS attack which includes many, mostly infected, devices sending traffic towards a single source to overload the target and prevent normal access.


What is network segmentation and basic traffic management concepts?

Once thought of as a perimeter defense security layer, firewalls are being brought into the infrastructure to protect different segments of the network such as finance, HR and engineering. Using firewalls as part of the internal network security solution will provide additional layers of access control to protect against the organization's sprawling definition of "authorized user," as well as provide attack containment. Adding firewalls to the infrastructure enables enterprises to protect specific resources, forcing users to authenticate themselves as they move from network to network, thereby reducing the risk of unauthorized access to sensitive information. In addition to user containment, internal firewalls add attack containment to the network to prevent damages from spreading in the event that an attack occurs. Examples of effective use of network segmentation include wireless LANs and customer extranets. Placing these users in their own segment, behind their own policy-based firewall, will allow enterprises to contain the users as well as any potential damages that may occur if an attack were to succeed. Rather than buying a separate, physical firewall for every segment, Juniper Networks provides the ability to segment the network through the high physical and virtual port densities of our products. Once thought of as a perimeter defense security layer, firewalls are being brought into the infrastructure to protect different segments of the network such as finance, HR and engineering. Using firewalls as part of the internal network security solution will provide additional layers of access control to protect against the organization's sprawling definition of "authorized user," as well as provide attack containment. Adding firewalls to the infrastructure enables enterprises to protect specific resources, forcing users to authenticate themselves as they move from network to network, thereby reducing the risk of unauthorized access to sensitive information. In addition to user containment, internal firewalls add attack containment to the network to prevent damages from spreading in the event that an attack occurs. Examples of effective use of network segmentation include wireless LANs and customer extranets. Placing these users in their own segment, behind their own policy-based firewall, will allow enterprises to contain the users as well as any potential damages that may occur if an attack were to succeed. Rather than buying a separate, physical firewall for every segment, Juniper Networks provides the ability to segment the network through the high physical and virtual port densities of our products.


Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device?

SYN flooding


What is Packet Replication Attack?

A Packet Replication Attack is an Internal attack on the Networking layer of the OSI model, in which the attacker belongs to the same network the victims belong to and attacks the resources inside the network. This makes it harder to find out who the attacker is. When a Packet Replication Attack is performed the attacker replicates stale packets (packets that are delayed past a certain time) and sends them to a trigger network. This results in loss of bandwidth of the network, and this will eventually start consuming battery life of the nodes as well.


How do we left to the left of the boom?

attack the network at the root


Can A denial of service attack can be used to deny hackers access to a computer system?

A denial of service attack is a technique that hackers use once they have already gained access to an individual computer, or a larger network. They essentially keep the computer or network so busy that it cannot access the internet. One would not use this technique to stop hackers. Strong virus and malware protection, coupled with a firewall, is the best defense.


How Do You Identify A DoS Attack?

A DoS attack can mimic non-malicious availability concerns like network congestion or a system administrator performing maintenance. The following signs may suggest a DoS or DDoS attack: Irregular network performance with reduced speed Inability to access any website Certain websites turn out to be unavailable Monitoring and analysing network traffic is the most prominent way to identify and evaluate a DoS attack.


What can be done to stop a Denial of Service attack?

if user configures the routers and all other network resources with ISO standards specifications.(we can stop only to certain extent).


You are alerted that suddenly 100 percent of the resources on your two core routers are being used and no legitimate traffic can travel into or out of your network what kind of security attack are you?

Looks like DDoS.


You are alerted that suddenly100 percent of the resources on your two core routers are being used and no legitimate traffic can travel into or out of your network what kind of attack?

Most likely it's DDoS. There is nothing you can do about it.