ExamGecko
Question list
Search
Search

Related questions











Question 382 - CISA discussion

Report
Export

Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?

A.
Customer service complaints
Answers
A.
Customer service complaints
B.
Automated monitoring of logs
Answers
B.
Automated monitoring of logs
C.
Server crashes
Answers
C.
Server crashes
D.
Penetration testing
Answers
D.
Penetration testing
Suggested answer: B

Explanation:

The best way to detect that a distributed denial of service (DDoS) attack is occurring is to use automated monitoring of logs.A DDoS attack disrupts the operations of a server, service, or network by flooding it with unwanted Internet traffic2.Automated monitoring of logs can help pinpoint potential DDoS attacks by analyzing network traffic patterns, monitoring traffic spikes or other unusual activity, and alerting administrators or security teams of any anomalies or malicious requests, protocols, or IP blocks3. Automated monitoring of logs can also help identify the source, type, and impact of the DDoS attack, and provide evidence for further investigation or mitigation.

The other options are not as effective as automated monitoring of logs for detecting DDoS attacks. Customer service complaints are an indirect and delayed indicator of a DDoS attack, as they rely on users reporting problems with accessing a website or service. Customer service complaints may also be caused by other factors unrelated to DDoS attacks, such as server errors or network issues. Server crashes are an extreme and undesirable indicator of a DDoS attack, as they indicate that the server has already been overwhelmed by the attack and has stopped functioning. Server crashes may also result in data loss or corruption, service disruption, or reputational damage. Penetration testing is a proactive and preventive measure for assessing the security posture of a system or network, but it does not detect ongoing DDoS attacks. Penetration testing may involve simulating DDoS attacks to test the resilience or vulnerability of a system or network, but it does not monitor real-time traffic or identify actual attackers.

ISACA CISA Review Manual 27th Edition (2019), page 254

How to prevent DDoS attacks | Methods and tools | Cloudflare2

Understanding Denial-of-Service Attacks | CISA3

asked 18/09/2024
Eusebio Adrian
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first