0
0
Cybersecurityknowledge~20 mins

Denial of Service (DoS/DDoS) in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
DoS/DDoS Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
What is the primary goal of a Denial of Service (DoS) attack?

Choose the option that best describes the main purpose of a DoS attack.

ATo make a service unavailable to its intended users by overwhelming it with traffic
BTo gain unauthorized access to a network by exploiting software vulnerabilities
CTo steal sensitive data from a server without being detected
DTo install malware on a victim's computer to control it remotely
Attempts:
2 left
💡 Hint

Think about what happens to a website or service when it is flooded with too many requests.

📋 Factual
intermediate
2:00remaining
Which of the following is a common method used in Distributed Denial of Service (DDoS) attacks?

Select the method that best describes how a DDoS attack is typically carried out.

AUsing multiple compromised computers to send traffic simultaneously to overwhelm a target
BUsing a single computer to send a large number of requests to a target
CIntercepting data packets to steal information during transmission
DEncrypting data on a victim's system and demanding ransom
Attempts:
2 left
💡 Hint

Think about the word 'Distributed' in DDoS and what it implies about the attack source.

🔍 Analysis
advanced
2:00remaining
Analyzing the impact of a SYN flood attack in a DoS scenario

What happens to a server when it is targeted by a SYN flood attack?

AThe server redirects all traffic to a malicious website
BThe server's memory fills up with half-open connections, preventing new connections from being established
CThe server's CPU overheats due to excessive processing of encrypted data
DThe server's files are deleted, causing permanent data loss
Attempts:
2 left
💡 Hint

Consider how TCP connections are established and what a half-open connection means.

Comparison
advanced
2:00remaining
Difference between DoS and DDoS attacks

Which statement correctly compares DoS and DDoS attacks?

ADoS attacks are legal, while DDoS attacks are illegal
BDoS attacks target only websites, while DDoS attacks target only networks
CDoS attacks come from a single source, while DDoS attacks come from multiple sources simultaneously
DDoS attacks always use malware, while DDoS attacks do not
Attempts:
2 left
💡 Hint

Focus on the number of sources involved in each attack type.

Reasoning
expert
2:00remaining
Why are DDoS attacks harder to defend against than DoS attacks?

Choose the best explanation for why defending against DDoS attacks is more challenging.

ABecause DDoS attacks only target offline systems
BBecause DDoS attacks use encrypted traffic that cannot be inspected
CBecause DDoS attacks exploit software bugs that are unknown to defenders
DBecause DDoS attacks use many different IP addresses, making it difficult to block all malicious traffic
Attempts:
2 left
💡 Hint

Think about how blocking traffic works and what happens when many sources are involved.