Which attack type involves multiple intermediary machines to contribute to a DDoS attack and is typically spoofed?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which attack type involves multiple intermediary machines to contribute to a DDoS attack and is typically spoofed?

Explanation:
This is about a distributed reflection denial-of-service. In this approach, the attacker doesn’t flood the target directly. Instead, they send small, forged requests to a large number of intermediary servers (the reflectors). Those reflectors then send their replies to the forged source address, which is the victim, creating a much larger volume of traffic directed at the target. The “distributed” part means many reflectors across different networks participate, amplifying the impact, while spoofing keeps the attacker hidden because the response traffic goes to the victim, not to the attacker. Classic examples include DNS or NTP amplification, where tiny requests provoke big responses to overwhelm the victim. The other options describe direct floods or non-reflection-based methods, which don’t involve spoofed traffic through intermediary machines.

This is about a distributed reflection denial-of-service. In this approach, the attacker doesn’t flood the target directly. Instead, they send small, forged requests to a large number of intermediary servers (the reflectors). Those reflectors then send their replies to the forged source address, which is the victim, creating a much larger volume of traffic directed at the target. The “distributed” part means many reflectors across different networks participate, amplifying the impact, while spoofing keeps the attacker hidden because the response traffic goes to the victim, not to the attacker. Classic examples include DNS or NTP amplification, where tiny requests provoke big responses to overwhelm the victim. The other options describe direct floods or non-reflection-based methods, which don’t involve spoofed traffic through intermediary machines.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy