List of questions
Related questions
Question 567 - 312-50v12 discussion
A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer. The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective?
A.
The attacker should instigate a protocol-based SYN flood attack, consuming connection state tables on the retailer's servers
B.
The attacker should execute a simple ICMP flood attack from a single IP, exploiting the retailer's ICMP processing
C.
The attacker should leverage a botnet to launch a Pulse Wave attack, sending high-volume traffic pulses at regular intervals
D.
The attacker should initiate a volumetric flood attack using a single compromised machine to overwhelm the retailer's network bandwidth
Your answer:
0 comments
Sorted by
Leave a comment first