DoomydoomGir
DoomydoomGir
01.11.2019 • 
English

Jacob was not happy with the product that he ordered from an online retailer. he tried to contact post purchase service desk but they replied that they cannot him in this matter. jacob wanted to avenge this by damaging the retailer's services. he used a utility named hoic that he downloaded from an underground site to flood the retailer's system with requests, so as the retailer's site was unable to handle any further requests even from legitimate users' purchase requests. what type of attack is jacob using? a. jacob uses poorly designed input validation routines to create or alter commands to gain access to unintended data or execute commands.b. jacob is executing commands or viewing data outside the intended target path.c. jacob is using a denial of service attack which is a valid threat used by an attacker.d. jacob is taking advantage of an incorrect configuration that leads to access with higher-than-expected privilege.

Solved
Show answers

Ask an AI advisor a question