Professional Documents
Culture Documents
5. Which type of DDoS attack aims to exhaust server resources by exploiting the stateful
nature of TCP?
A. Volumetric attack
B. TCP State Exhaustion attack
C. Application layer attack
D. DNS amplification attack
7. Which layer of the OSI model is often targeted in application layer DDoS attacks?
A. Data Link Layer
B. Network Layer
C. Transport Layer
D. Application Layer
Correct Answer: D. Application Layer
Explanation: Application layer DDoS attacks target vulnerabilities in the application layer.
10. What is a common technique for defending against DDoS attacks at the network
perimeter?
A. VPN encryption
B. Network segmentation
C. Load balancing
D. Traffic filtering
Correct Answer: D. Traffic filtering
Explanation: Traffic filtering helps block malicious traffic and allows only legitimate traffic
through.
12. Which of the following is a common amplification technique used in DDoS attacks?
A. SYN flooding
B. ICMP flooding
C. DNS amplification
D. Application layer attacks
Correct Answer: C. DNS amplification
Explanation: DNS amplification involves using vulnerable DNS servers to amplify the
volume of attack traffic.
13. What role does a SYN flood attack play in DDoS attacks?
A. Amplification
B. Traffic flooding
C. Resource exhaustion
D. TCP state exhaustion
Correct Answer: B. Traffic flooding
Explanation: SYN flood attacks flood a target with TCP connection requests, overwhelming
its resources.
14. Which layer of the OSI model is targeted in SYN flood attacks?
A. Network Layer
B. Data Link Layer
C. Transport Layer
D. Application Layer
Correct Answer: C. Transport Layer
Explanation: SYN flood attacks exploit vulnerabilities in the Transport Layer (TCP).
15. What is the main advantage of using a DDoS botnet for attackers?
A. Increased network speed
B. Anonymity and control
C. Encryption of attack traffic
D. Improved DNS resolution
Correct Answer: B. Anonymity and control
Explanation: A botnet provides attackers with anonymity and centralized control over
multiple compromised devices.
16. Which DDoS attack type focuses on exploiting vulnerabilities in web applications?
A. Volumetric attack
B. Application layer attack
C. SYN flood attack
D. DNS amplification attack
Correct Answer: B. Application layer attack
Explanation: Application layer attacks target vulnerabilities in web applications to disrupt
services.
18. Which type of DDoS attack aims to consume the target's resources by establishing and
maintaining a large number of incomplete connections?
A. Volumetric attack
B. TCP State Exhaustion attack
C. Application layer attack
D. SYN flood attack
Correct Answer: D. SYN flood attack
Explanation: SYN flood attacks create a large number of incomplete TCP connections to
exhaust server resources.
20. Which of the following is a common countermeasure against DDoS attacks that
involves diverting traffic to a separate network?
A. Network segmentation
B. Load balancing
C. Traffic filtering
D. Scrubbing centers
Correct Answer: D. Scrubbing centers
Explanation: Scrubbing centers divert and filter traffic to mitigate the impact of DDoS
attacks.
22. Which type of DDoS attack aims to exploit vulnerabilities in the implementation of the
TCP threeway handshake?
A. Volumetric attack
B. Application layer attack
C. SYN/ACK attack
D. TCP State Exhaustion attack
Correct Answer: C. SYN/ACK attack
Explanation: SYN/ACK attacks manipulate the TCP threeway handshake to exhaust server
resources.
Explanation: Layer 7 DDoS attacks target specific aspects of web applications to disrupt
services.
24. Which of the following is a method to detect and mitigate DDoS attacks in realtime?
A. Load balancing
B. Intrusion Detection System (IDS)
C. DNS amplification
D. SYN flood attack
Correct Answer: B. Intrusion Detection System (IDS)
Explanation: IDS can detect and respond to abnormal network behavior indicative of a
DDoS attack.
25. How can a Content Delivery Network (CDN) assist in DDoS mitigation?
A. By encrypting all network traffic
B. By diverting traffic to a separate network
C. By distributing content across multiple servers
D. By filtering DNS requests
Correct Answer: C. By distributing content across multiple servers
Explanation: CDNs distribute content to multiple servers, helping to mitigate DDoS impact.
27. Which of the following is a technique to distinguish between legitimate and malicious
traffic during a DDoS attack?
A. Load balancing
B. Anycast routing
C. Traffic analysis
D. DNS amplification
Correct Answer: C. Traffic analysis
Explanation: Traffic analysis helps identify patterns and characteristics of malicious traffic.
29. Which network security measure is designed to prevent unauthorized access and
secure network resources during a DDoS attack?
A. Intrusion Detection System (IDS)
B. Network segmentation
C. VPN encryption
D. Firewall configuration
Correct Answer: B. Network segmentation
Explanation: Network segmentation helps contain the impact of a DDoS attack by isolating
network segments.
31. What is the primary purpose of a reflection attack in the context of DDoS?
A. To exploit TCP vulnerabilities
B. To amplify attack traffic using legitimate services
C. To compromise user credentials
D. To disrupt DNS services
Correct Answer: B. To amplify attack traffic using legitimate services
Explanation: Reflection attacks use legitimate services to amplify and reflect attack traffic
towards the target.
35. Which DDoS attack type focuses on exploiting vulnerabilities in the internet routing
protocol BGP (Border Gateway Protocol)?
A. BGP amplification
B. SYN flood attack
C. UDP reflection attack
D. Smurf attack
Correct Answer: A. BGP amplification
Explanation: BGP amplification attacks exploit vulnerabilities in the Border Gateway
Protocol.
37. Which type of DDoS attack targets the transport layer by overwhelming a target with a
high volume of TCP connection requests?
A. SYN flood attack
B. Application layer attack
40. What role does a WAF (Web Application Firewall) play in DDoS defense?
A. To amplify attack traffic
B. To divert traffic to a separate network
C. To analyze and filter web traffic
D. To secure DNS against attacks
Correct Answer: C. To analyze and filter web traffic
Explanation: WAFs help analyze and filter malicious web traffic, providing protection
against certain DDoS attacks.
42. How does a UDP flood DDoS attack differ from a TCP SYN flood attack?
A. UDP floods target DNS servers
B. UDP floods use the TCP handshake
C. UDP floods focus on overwhelming network bandwidth
D. UDP floods manipulate the DNS protocol
Correct Answer: C. UDP floods focus on overwhelming network bandwidth
Explanation: UDP flood attacks aim to saturate network bandwidth with a high volume of
UDP packets.