0
0
Cybersecurityknowledge~10 mins

Denial of Service (DoS/DDoS) in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to explain what a Denial of Service (DoS) attack does.

Cybersecurity
A Denial of Service (DoS) attack aims to [1] a network or service so legitimate users cannot access it.
Drag options to blanks, or click blank then click option'
Adisrupt
Bstrengthen
Cmonitor
Dencrypt
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing DoS with improving or protecting the service.
Thinking DoS encrypts data.
2fill in blank
medium

Complete the sentence to identify the difference between DoS and DDoS attacks.

Cybersecurity
A Distributed Denial of Service (DDoS) attack uses [1] sources to overwhelm a target, unlike a DoS attack which uses a single source.
Drag options to blanks, or click blank then click option'
Asingle
Bencrypted
Csecure
Dmultiple
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing DDoS with single-source attacks.
Thinking DDoS uses encrypted sources.
3fill in blank
hard

Fix the error in the description of a DoS attack method.

Cybersecurity
One common DoS attack method is called a [1] attack, which floods the target with excessive traffic.
Drag options to blanks, or click blank then click option'
Aphishing
Bspoofing
Cflood
Dransomware
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing flood with phishing or ransomware.
Thinking spoofing is the main DoS attack method.
4fill in blank
hard

Fill both blanks to complete the explanation of a common defense against DoS attacks.

Cybersecurity
To defend against DoS attacks, networks often use [1] to filter traffic and [2] to absorb large volumes of requests.
Drag options to blanks, or click blank then click option'
Afirewalls
Bencryption
Cload balancers
Dpasswords
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing encryption or passwords as defense tools.
Confusing load balancers with firewalls.
5fill in blank
hard

Fill all three blanks to complete the description of a botnet used in DDoS attacks.

Cybersecurity
A botnet is a network of [1] devices controlled by an attacker to send [2] traffic and cause [3] to the target.
Drag options to blanks, or click blank then click option'
Ainfected
Blarge
Cdisruption
Dsecured
Attempts:
3 left
💡 Hint
Common Mistakes
Thinking botnets use secured devices.
Confusing the size of traffic or the effect caused.