Which attack floods the network with traffic to create noise so the IDS may miss true attack traffic?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which attack floods the network with traffic to create noise so the IDS may miss true attack traffic?

Explanation:
Flooding attacks are about overwhelming the network with a high volume of traffic to create noise and exhaust resources, making it difficult for an intrusion detection system to inspect and distinguish real attack traffic from the flood. When the network or devices like routers and the IDS are saturated, legitimate signals can be buried, delaying or hiding true malicious activity. The option that describes this behavior best is flooding, since the goal is volume-based disruption that reduces visibility into actual attacks. The other terms don’t capture the same idea: manipulating a TCP ACK flag relates to a protocol-level behavior, ICMP tunneling uses ICMP to carry data covertly rather than to saturate bandwidth, and the term listed as HTTPort doesn’t describe a standard flood-based approach.

Flooding attacks are about overwhelming the network with a high volume of traffic to create noise and exhaust resources, making it difficult for an intrusion detection system to inspect and distinguish real attack traffic from the flood. When the network or devices like routers and the IDS are saturated, legitimate signals can be buried, delaying or hiding true malicious activity.

The option that describes this behavior best is flooding, since the goal is volume-based disruption that reduces visibility into actual attacks. The other terms don’t capture the same idea: manipulating a TCP ACK flag relates to a protocol-level behavior, ICMP tunneling uses ICMP to carry data covertly rather than to saturate bandwidth, and the term listed as HTTPort doesn’t describe a standard flood-based approach.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy