What defense may be employed against this technique?

What will be an ideal response?


The system could limit the number of resources a user may hold simultaneously and
prevent users from holding onto resources for an extended period of time.Also, the system
could limit the number of times a user can request a resource in a certain time period. Finally,
the system could monitor resource requests and report any suspicious patterns to the system
administrator.

Computer Science & Information Technology

You might also like to view...

A member function that is declared __________ may not access any non-static data members in the class.

a. private b. public c. static d. inline e. None of these

Computer Science & Information Technology

Application-layer gateways can control the way applications inside the network access external networks by setting up proxy services.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The modified insertion sort introduced in 1959 by D. E. Shell is known as the diminishing return sort.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A brownout has occurred within a building. A technician is repairing a workstation which has a power light, but is not displaying anything on the screen and is not making any sounds during boot up. Which of the following should be used to further troubleshoot the workstation?

A. Loop back plug B. POST card C. Power supply tester D. Multimeter

Computer Science & Information Technology