Which attack uses multiple sources to overwhelm a target with traffic?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which attack uses multiple sources to overwhelm a target with traffic?

Explanation:
Overwhelming a target with traffic coming from many different sources is the defining feature of a distributed denial of service attack. The aim is to exhaust bandwidth, processing power, or other resources so legitimate users can’t reach the service. That makes this the DDoS attack, which leverages multiple sources—often a botnet or other distributed origins—to flood the target. Spoofing focuses on disguising where traffic appears to come from and isn’t by itself about flooding resources. A botnet is the network of compromised devices used to carry out such floods, but it’s the means behind the attack, not the attack type itself. Encryption protects data, not availability, so it doesn’t describe an overload scenario.

Overwhelming a target with traffic coming from many different sources is the defining feature of a distributed denial of service attack. The aim is to exhaust bandwidth, processing power, or other resources so legitimate users can’t reach the service. That makes this the DDoS attack, which leverages multiple sources—often a botnet or other distributed origins—to flood the target.

Spoofing focuses on disguising where traffic appears to come from and isn’t by itself about flooding resources. A botnet is the network of compromised devices used to carry out such floods, but it’s the means behind the attack, not the attack type itself. Encryption protects data, not availability, so it doesn’t describe an overload scenario.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy