CEH - Certified Ethical Hacker Practice Questions: Denial-of-Service Domain
Test your CEH - Certified Ethical Hacker knowledge with 5 practice questions from the Denial-of-Service domain. Includes detailed explanations and answers.
CEH - Certified Ethical Hacker Practice Questions
Master the Denial-of-Service Domain
Test your knowledge in the Denial-of-Service domain with these 5 practice questions. Each question is designed to help you prepare for the CEH - Certified Ethical Hacker certification exam with detailed explanations to reinforce your learning.
Question 1
As part of a DoS mitigation strategy, a company is using a rate-limiting solution. What is the primary goal of implementing rate limiting on network traffic?
Show Answer & Explanation
Correct Answer: C
Explanation: Rate limiting controls the rate of requests sent to a server, preventing a single client from overwhelming the server by limiting the number of requests it can make.
Question 2
During a penetration test, you need to simulate a Denial-of-Service attack on a target web server to gauge its resilience. Which tool would you use to generate a large number of HTTP requests to the server in a short period of time?
Show Answer & Explanation
Correct Answer: D
Explanation: LOIC (Low Orbit Ion Cannon) is a popular tool for generating high volumes of traffic in a short period, simulating a DoS attack. It's often used in stress testing web servers.
Question 3
A company wants to protect its network from Distributed Denial-of-Service (DDoS) attacks. Which of the following methods is least effective?
Show Answer & Explanation
Correct Answer: D
Explanation: While IDS can detect and alert based on anomalous traffic patterns, it does not actively block traffic and thus is not effective in stopping a DDoS attack.
Question 4
Which of the following is a reflection-based DDoS attack where the attacker sends a victim's IP address in a request to a server, causing the server to send a large response to the victim?
Show Answer & Explanation
Correct Answer: A
Explanation: DNS amplification attacks use the reflection technique, where a small query can trigger a large response to be sent to the victim, amplifying the impact of the attack.
Question 5
Which technique can be used to protect a network from DNS amplification attacks?
Show Answer & Explanation
Correct Answer: A
Explanation: CORRECT: Disabling recursive queries prevents DNS servers from being used in amplification attacks. OPTION A: Disabling recursion reduces amplification risk. OPTION B: A DMZ separates networks but does not prevent DNS amplification. OPTION C: MAC filtering controls device access, not DNS queries. OPTION D: Enabling SSH does not relate to DNS amplification.
Ready to Accelerate Your CEH - Certified Ethical Hacker Preparation?
Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.
- ✅ Unlimited practice questions across all CEH - Certified Ethical Hacker domains
- ✅ Full-length exam simulations with real-time scoring
- ✅ AI-powered performance tracking and weak area identification
- ✅ Personalized study plans with adaptive learning
- ✅ Mobile-friendly platform for studying anywhere, anytime
- ✅ Expert explanations and study resources
Already have an account? Sign in here
About CEH - Certified Ethical Hacker Certification
The CEH - Certified Ethical Hacker certification validates your expertise in denial-of-service and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.
Check out our comprehensive guide: CEH Mock Exam Mastery: Practice Questions & Insights