Data Availability Attacks | CompTIA Security+ SY0-601 Exam

Data Availability Attacks

Prev Question Next Question

Question

Which of the following attacks specifically impact data availability?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

https://www.netscout.com/what-is-ddos

The correct answer is A. DDoS.

A DDoS (Distributed Denial of Service) attack is designed to disrupt the availability of a particular resource, such as a website or application, by overwhelming it with traffic. In a DDoS attack, a large number of compromised systems, or bots, are used to flood the target system with traffic, making it difficult or impossible for legitimate users to access the resource.

On the other hand, Trojans, MITM (Man-in-the-Middle) attacks, and Rootkits are attacks that can impact data confidentiality and/or integrity, but not availability.

A Trojan is a type of malware that appears to be legitimate software but actually contains malicious code that can be used to steal sensitive information or perform unauthorized actions on a system.

A MITM attack involves an attacker intercepting and potentially altering communication between two parties. This can be used to steal sensitive information or perform unauthorized actions on a system.

A Rootkit is a type of malware that is designed to hide its presence on a system and allow an attacker to maintain unauthorized access to the system. This can be used to steal sensitive information or perform unauthorized actions on a system.

Therefore, DDoS attacks are specifically designed to impact data availability, while Trojans, MITM attacks, and Rootkits are not.