Which of the following is an example of resource exhaustion?
A) A penetration tester requests every available IP address from a DHCP server.
B) An SQL injection attack returns confidential data back to the browser.
C) Server CPU utilization peaks at 100% during the reboot process.
D) System requirements for a new software package recommend having 12GB of RAM, but only 8GB are available.
Correct Answer:
Verified
Q989: During a risk assessment, results show that
Q990: A salesperson often uses a USB drive
Q991: A small retail business has a local
Q992: A systems administrator needs to install the
Q993: Using an ROT13 cipher to protect confidential
Q995: A forensics analyst is investigating a hard
Q996: Which of the following policies would help
Q997: A technician has installed a new AAA
Q998: A recent penetration test revealed several issues
Q999: The application team within a company is
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents