1.
Relatively simple to conduct, even by an unskilled attacker.
Correct Answer
A. DoS
Explanation
A Denial of Service (DoS) attack is relatively simple to conduct, even by an unskilled attacker. In a DoS attack, the attacker overwhelms a target system or network with a flood of traffic, causing it to become unavailable to legitimate users. This can be achieved by sending a large number of requests or exploiting vulnerabilities in the target's infrastructure. Unlike Distributed Denial of Service (DDoS) attacks, which involve multiple attackers, a DoS attack can be carried out by a single individual. SEO Poisoning, on the other hand, involves manipulating search engine results to redirect users to malicious websites and is not related to the simplicity of conducting an attack.
2.
Originates from multiple, coordinated sources.
Correct Answer
B. DDoS
Explanation
The correct answer is DDoS. DDoS stands for Distributed Denial of Service, which is a type of cyber attack where multiple sources are used to overwhelm a target system or network with a flood of traffic, rendering it inaccessible to legitimate users. Unlike a DoS (Denial of Service) attack, which originates from a single source, a DDoS attack involves multiple coordinated sources, making it more difficult to mitigate and defend against. SEO Poisoning, on the other hand, is a technique used to manipulate search engine rankings and is unrelated to the given explanation.
3.
Attackers builds a network of infected hosts, called a botnet.
Correct Answer
B. DDoS
Explanation
A Distributed Denial of Service (DDoS) attack involves an attacker using multiple compromised computers or devices to flood a target system or network with a high volume of traffic, overwhelming its resources and causing it to become inaccessible to legitimate users. The attacker builds a network of infected hosts, known as a botnet, to carry out the attack. This botnet is controlled by the attacker and can be used to launch coordinated DDoS attacks from multiple sources simultaneously. Therefore, the given answer, DDoS, correctly describes the scenario where attackers build a network of infected hosts to carry out the attack.
4.
When a network, host, or application is sent an enormous quantity of data at a rate which it cannot handle.
Correct Answer
A. DoS
Explanation
When a network, host, or application is sent an enormous quantity of data at a rate which it cannot handle, it is referred to as a Denial of Service (DoS) attack. In such an attack, the targeted system becomes overwhelmed and unable to respond to legitimate requests, effectively denying access to legitimate users. This can be achieved through various means, such as flooding the system with traffic or exploiting vulnerabilities to exhaust system resources. DoS attacks can cause significant disruption and downtime for the targeted entity. DDoS (Distributed Denial of Service) is a similar attack, but it involves multiple sources coordinating the attack, making it even more difficult to mitigate. SEO Poisoning, on the other hand, is a technique used to manipulate search engine results and is unrelated to the given scenario.
5.
Make a malicious website appear higher in search results.
Correct Answer
C. SEO Poisoning
Explanation
SEO poisoning is a technique used by attackers to manipulate search engine rankings in order to make a malicious website appear higher in search results. By using various black-hat SEO techniques, such as keyword stuffing, link farming, and cloaking, the attacker can deceive search engines and increase the visibility of their malicious website. This can lead to unsuspecting users clicking on the malicious website, potentially exposing them to malware, phishing attempts, or other forms of cyber attacks.
6.
Increase traffic to malicious sites that may host malware or perform social engineering.
Correct Answer
C. SEO Poisoning
Explanation
SEO poisoning is a technique used by cybercriminals to manipulate search engine rankings and redirect users to malicious websites. By increasing traffic to these sites, they can expose users to malware or engage in social engineering attacks. This tactic is often employed to deceive users and exploit vulnerabilities in their systems.