Denial-of-Service

Disrupting service availability.

Details DoS and DDoS concepts, attack tools and techniques, botnets, and protective measures such as traffic filtering and response strategies to mitigate service disruptions.
5 minutes 5 Questions

Denial-of-Service (DoS) attacks in the Certified Ethical Hacker (CEH) context represent deliberate attempts to make networks, systems, or services unavailable to legitimate users. These attacks work by overwhelming target resources with excessive traffic or requests, exhausting system capabilities.…

Concepts covered: DoS/DDoS Countermeasures, DoS/DDoS Concepts, DoS/DDoS Attack Techniques, Botnets, DDoS Case Study, DoS/DDoS Attack Tools, DoS/DDoS Protection Tools

Test mode:
CEH - Denial-of-Service Example Questions

Test your knowledge of Denial-of-Service

Question 1

A multinational e-commerce platform has detected that their payment gateway is experiencing intermittent outages. The security team observes that their servers are receiving a flood of ICMP echo request packets (pings) that appear to be coming from spoofed IP addresses. These packets have unusually large payloads, which is causing network congestion and exhausting bandwidth on their network infrastructure. Legitimate customers are reporting timeout errors when attempting to complete purchases. Which DoS/DDoS attack technique is most likely being used?

Question 2

You are a security analyst for a medium-sized e-commerce company. During a major sales event, your network monitoring system alerts you to a sudden spike in traffic from multiple geographic locations, targeting your web servers. The servers are becoming increasingly unresponsive, and customer complaints are rising. Upon initial investigation, you notice thousands of TCP SYN packets flooding your network, but very few SYN-ACK responses are being completed. What type of attack is most likely occurring, and what is the best immediate mitigation strategy?

Question 3

A multinational corporation has detected a suspicious pattern where their web application is experiencing thousands of legitimate-looking HTTP requests per second that appear to be requesting computationally intensive search queries. These requests are causing the application servers to reach 100% CPU utilization while appearing to come from numerous different IP addresses globally. The security team needs to implement a specific solution to protect against this sophisticated HTTP flood attack. Which DoS/DDoS protection tool is most appropriate for this scenario?

More Denial-of-Service questions
102 questions (total)