Which flood attack uses randomly generated GET requests within a valid page range to appear legitimate and exhaust resources?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which flood attack uses randomly generated GET requests within a valid page range to appear legitimate and exhaust resources?

Explanation:
This question focuses on an HTTP flood technique that hides inside normal-looking traffic by targeting valid pages. A Random Recursive GET Flood Attack works by issuing many GET requests drawn from the set of legitimate pages, choosing them at random within that valid range. Because the requests resemble normal browsing, they blend in with legitimate user traffic and bypass simple filters that flag unusual or non-existent resources. The result is heavy resource consumption on the server—CPU, memory, and I/O—as it tries to fulfill a large number of unique, valid page requests. In contrast, other descriptions refer to patterns that don’t rely on random valid-page requests: a single-session flood uses many requests from a single connection, a DRDoS uses amplifiers in reflectors to magnify traffic, and a peer-to-peer attack leverages a network of peers to generate load.

This question focuses on an HTTP flood technique that hides inside normal-looking traffic by targeting valid pages. A Random Recursive GET Flood Attack works by issuing many GET requests drawn from the set of legitimate pages, choosing them at random within that valid range. Because the requests resemble normal browsing, they blend in with legitimate user traffic and bypass simple filters that flag unusual or non-existent resources. The result is heavy resource consumption on the server—CPU, memory, and I/O—as it tries to fulfill a large number of unique, valid page requests.

In contrast, other descriptions refer to patterns that don’t rely on random valid-page requests: a single-session flood uses many requests from a single connection, a DRDoS uses amplifiers in reflectors to magnify traffic, and a peer-to-peer attack leverages a network of peers to generate load.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy