What defense may be employed against this technique?

What will be an ideal response?

The system could limit the number of resources a user may hold simultaneously and
prevent users from holding onto resources for an extended period of time.Also, the system
could limit the number of times a user can request a resource in a certain time period. Finally,
the system could monitor resource requests and report any suspicious patterns to the system
administrator.

Computer Science & Information Technology

You might also like to view...

ND makes use of multicast addresses. Which multicast address is expressed using ff02::1?

A. all nodes B. all routers C. all proxies D. all domains

Computer Science & Information Technology

A(n) ____________________ checklist often covers housekeeping tasks, user orientation and final entries in a site management notebook.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology