A corporation uses both hardware-based and cloud-based solutions to distribute incoming traffic and absorb DDoS attacks, ensuring legitimate requests remain unaffected. Which DDoS mitigation strategy is being utilized?
The CEH DDoS Mitigation Strategies section explains that load balancing distributes traffic across multiple servers or infrastructure components to prevent any single resource from being overwhelmed.
By using hardware load balancers and cloud-based traffic distribution, organizations can:
Absorb large volumes of attack traffic
Maintain service availability
Ensure legitimate users are served
Option B is correct and directly matches CEH’s definition.
Option A drops all traffic, including legitimate requests.
Option C focuses on traffic analysis rather than distribution.
Option D limits traffic rather than distributing it.
CEH strongly recommends load balancing as a core DDoS resilience mechanism.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit