Ray and his team are increasing the network devices' bandwidth and the servers' capacity to handle the increased traffic caused by the DoS/DDoS attack. This method helps to minimize the impact and maintain service availability by absorbing the attack rather than blocking it or diverting it elsewhere. By enhancing the system's capacity to manage the increased load, they ensure that the services remain largely unaffected, thus absorbing the attack.
The correct answer is Directory Traversal Attack. This type of attack occurs when an attacker manipulates the URL path to access files and directories that are outside the web application's root directory. In this case, the use of '../' sequences in the URL is an attempt to traverse the directory structure to access the '/etc/passwd' file, which contains sensitive information such as user passwords.
URL Encoding replaces unusual ASCII characters with '%' followed by the character’s two-digit ASCII code expressed in hexadecimal. This method is commonly used to represent special characters and non-alphanumeric characters in URLs, ensuring they are transmitted and processed correctly by web applications.
Risk is typically calculated using the formula Risk = Likelihood × Impact × Asset Value. This formula reflects how risk is assessed in terms of the probability of an event occurring, the potential effect of the event, and the value of the asset involved. This helps quantify risk in a way that can be managed and mitigated effectively.
The Syslog message severity levels are indeed labelled from level 0 to level 7, where each level indicates the severity of the message. According to standard Syslog definitions, level 0 indicates 'Emergency,' meaning that the system is unusable. This is the highest severity level and signifies a critical condition that needs immediate attention.