Which DDoS category combines volumetric, protocol, and application-layer attacks to disrupt services?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which DDoS category combines volumetric, protocol, and application-layer attacks to disrupt services?

Explanation:
The idea being tested is how a DDoS campaign can overwhelm a service by using multiple attack methods across different layers at once. Volumetric floods aim to saturate the network bandwidth, protocol attacks exhaust server resources by abusing how the network stack handles connections and state, and application-layer floods target the application itself with requests that consume CPU, memory, or database resources. When a single campaign employs all three kinds of techniques together, it’s called multi-vector DDoS attacks. This approach is harder to defend against because defenses must recognize and mitigate several distinct patterns happening simultaneously, across network, transport, and application layers. The other options describe specific, single-method tactics or architectures—reflection-based amplification, P2P-based botnets, or a particular application-layer exploit like Slowloris—rather than the combined, multi-vector approach.

The idea being tested is how a DDoS campaign can overwhelm a service by using multiple attack methods across different layers at once. Volumetric floods aim to saturate the network bandwidth, protocol attacks exhaust server resources by abusing how the network stack handles connections and state, and application-layer floods target the application itself with requests that consume CPU, memory, or database resources. When a single campaign employs all three kinds of techniques together, it’s called multi-vector DDoS attacks. This approach is harder to defend against because defenses must recognize and mitigate several distinct patterns happening simultaneously, across network, transport, and application layers. The other options describe specific, single-method tactics or architectures—reflection-based amplification, P2P-based botnets, or a particular application-layer exploit like Slowloris—rather than the combined, multi-vector approach.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy