CEH - Certified Ethical Hacker Practice Questions: Denial-of-Service Domain
Test your CEH - Certified Ethical Hacker knowledge with 5 practice questions from the Denial-of-Service domain. Includes detailed explanations and answers.
CEH - Certified Ethical Hacker Practice Questions
Master the Denial-of-Service Domain
Test your knowledge in the Denial-of-Service domain with these 5 practice questions. Each question is designed to help you prepare for the CEH - Certified Ethical Hacker certification exam with detailed explanations to reinforce your learning.
Question 1
As part of a DoS mitigation strategy, a company is using a rate-limiting solution. What is the primary goal of implementing rate limiting on network traffic?
Show Answer & Explanation
Correct Answer: C
Explanation: Rate limiting controls the rate of requests sent to a server, preventing a single client from overwhelming the server by limiting the number of requests it can make.
Question 2
During a penetration test, you need to simulate a Denial-of-Service attack on a target web server to gauge its resilience. Which tool would you use to generate a large number of HTTP requests to the server in a short period of time?
Show Answer & Explanation
Correct Answer: D
Explanation: LOIC (Low Orbit Ion Cannon) is a popular tool for generating high volumes of traffic in a short period, simulating a DoS attack. It's often used in stress testing web servers.
Question 3
A company wants to protect its network from Distributed Denial-of-Service (DDoS) attacks. Which of the following methods is least effective?
Show Answer & Explanation
Correct Answer: D
Explanation: While IDS can detect and alert based on anomalous traffic patterns, it does not actively block traffic and thus is not effective in stopping a DDoS attack.
Question 4
Which of the following is a reflection-based DDoS attack where the attacker sends a victim's IP address in a request to a server, causing the server to send a large response to the victim?
Show Answer & Explanation
Correct Answer: A
Explanation: DNS amplification attacks use the reflection technique, where a small query can trigger a large response to be sent to the victim, amplifying the impact of the attack.
Question 5
Which technique can be used to protect a network from DNS amplification attacks?
Show Answer & Explanation
Correct Answer: A
Explanation: CORRECT: Disabling recursive queries prevents DNS servers from being used in amplification attacks. OPTION A: Disabling recursion reduces amplification risk. OPTION B: A DMZ separates networks but does not prevent DNS amplification. OPTION C: MAC filtering controls device access, not DNS queries. OPTION D: Enabling SSH does not relate to DNS amplification.
Ready to Accelerate Your CEH - Certified Ethical Hacker Preparation?
Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.
- ✅ Unlimited practice questions across all CEH - Certified Ethical Hacker domains
- ✅ Full-length exam simulations with real-time scoring
- ✅ AI-powered performance tracking and weak area identification
- ✅ Personalized study plans with adaptive learning
- ✅ Mobile-friendly platform for studying anywhere, anytime
- ✅ Expert explanations and study resources
Already have an account? Sign in here
About CEH - Certified Ethical Hacker Certification
The CEH - Certified Ethical Hacker certification validates your expertise in denial-of-service and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.
🔐 Certified Ethical Hacker (CEH) 2025 – Complete Exam Guide
Exam details, difficulty, costs, study plan & essential preparation tips
Preparing for the CEH exam? Don’t miss our comprehensive guide that breaks down every domain, exam blueprint, recommended study resources, and a practical study plan to help you pass on your first try.
👉 Read the CEH 2025 Ultimate Guide📚 Explore More CEH Practice Questions by Topic
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service (DoS)
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography