What defense may be employed against this technique?
What will be an ideal response?
The system could limit the number of resources a user may hold simultaneously and
prevent users from holding onto resources for an extended period of time.Also, the system
could limit the number of times a user can request a resource in a certain time period. Finally,
the system could monitor resource requests and report any suspicious patterns to the system
administrator.
You might also like to view...
ND makes use of multicast addresses. Which multicast address is expressed using ff02::1?
A. all nodes B. all routers C. all proxies D. all domains
A(n) ____________________ checklist often covers housekeeping tasks, user orientation and final entries in a site management notebook.
Fill in the blank(s) with the appropriate word(s).