Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 31 Topic 4 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 31 Topic 4 Discussion

312-50v13 Exam Topic 4 Question 31 Discussion:
Question #: 31
Topic #: 4

A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer. The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective?


A.

The attacker should instigate a protocol-based SYN flood attack, consuming connection state tables on the retailer's servers


B.

The attacker should execute a simple ICMP flood attack from a single IP, exploiting the retailer's ICMP processing


C.

The attacker should leverage a botnet to launch a Pulse Wave attack, sending high-volume traffic pulses at regular intervals


D.

The attacker should initiate a volumetric flood attack using a single compromised machine to overwhelm the retailer's network bandwidth


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.