90.8k views
2 votes
Which of the following are correct?

a. A DDos attack is cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitly disrupting services of a host connected to a network.
b. DoS attacks affect the confidentiality of data on a network.
c. Proxy firewalls carry out external network. access on behalf of clients on the internal network
d. Intrusion Detection Systems are based partly on the hypothesis that exploiting a system's vulnerabilities is likely to result in abnormal network activity.

1 Answer

6 votes

Final answer:

A DDoS attack seeks to disrupt services, DoS attacks do not directly affect data confidentiality, proxy firewalls provide external network access, and IDS are based on the hypothesis of system vulnerabilities causing abnormal network activity.

Step-by-step explanation:

a. A DDoS attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network.

b. DoS attacks do not directly affect the confidentiality of data on a network. Instead, they aim to make a service or network unavailable, which may indirectly impact the confidentiality of data if the service or network is compromised.

c. Proxy firewalls do carry out external network access on behalf of clients on the internal network. They act as intermediaries between the client and the external network, providing security and controlling access.

d. Intrusion Detection Systems (IDS) are indeed based partly on the hypothesis that exploiting system vulnerabilities is likely to result in abnormal network activity. IDS monitors network traffic to identify and respond to potential intrusions or attacks.