Which attack is a large-scale, coordinated assault on availability launched from many compromised machines over the Internet?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which attack is a large-scale, coordinated assault on availability launched from many compromised machines over the Internet?

Explanation:
A distributed denial-of-service attack is a large-scale, coordinated assault on availability launched from many compromised machines over the Internet. The defender faces a flood of traffic or requests coming from hundreds or thousands of sources, all working together under remote control (a botnet). Because the traffic originates from so many different machines across the globe, it’s harder to stop by blocking a single IP and the target’s bandwidth or resources get overwhelmed, making services unavailable to legitimate users. This contrasts with a normal denial-of-service, which typically comes from a single source and is easier to mitigate. An ICMP flood is one method that can be used in such attacks, but the defining trait here is the distributed, coordinated nature. Ping of Death is an antiquated, single-source vulnerability exploit, not a modern large-scale, multi-source intrusion.

A distributed denial-of-service attack is a large-scale, coordinated assault on availability launched from many compromised machines over the Internet. The defender faces a flood of traffic or requests coming from hundreds or thousands of sources, all working together under remote control (a botnet). Because the traffic originates from so many different machines across the globe, it’s harder to stop by blocking a single IP and the target’s bandwidth or resources get overwhelmed, making services unavailable to legitimate users. This contrasts with a normal denial-of-service, which typically comes from a single source and is easier to mitigate. An ICMP flood is one method that can be used in such attacks, but the defining trait here is the distributed, coordinated nature. Ping of Death is an antiquated, single-source vulnerability exploit, not a modern large-scale, multi-source intrusion.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy