Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which vulnerability can lead to Denial of Service attack?
Home
Threat Modeling
Which vulnerability can lead to Denial of Service attack?
0
votes
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
Which vulnerability can lead to Denial of Service attack?
a) Cross Site scripting
b) Cross Site Request Forgery
c) XXE
d) Session Hijacking
denial-of-service-attack
dos-attack
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 18, 2021
by
sharadyadav1986
a) Cross Site scripting
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
vulnerability-type
malicious
script
ssa
+1
vote
Q: What is a DOS attack? Name its common forms.
asked
May 17, 2021
in
Ethical Hacking
by
Robindeniel
dos-attack
dos-forms
0
votes
Q: Which of the following can lead to leakage of private data?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: Multifactor authentication can be used to handle _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
multifactor-authentication
authentication
application-authentication
ssa
0
votes
Q: Which of the following is used to retain integrity in a software?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
software-integrity
software-security
ssa
0
votes
Q: DoS attacks are prevented using _______.
asked
Mar 5, 2022
in
API Gateways
by
rajeshsharma
dos-attack
0
votes
Q: Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
Q: Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Q: The output of the threat modeling process is a _________ which details out the threats and mitigation steps.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling-process
threat-mitigation
threat-process
ssa
...