0
0
HLDsystem_design~20 mins

DDoS protection strategies in HLD - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
DDoS Defense Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Basic DDoS Mitigation Techniques

Which of the following is the most effective initial step to mitigate a volumetric DDoS attack targeting a web service?

ADeploy a Web Application Firewall (WAF) to filter malicious HTTP requests.
BUse rate limiting at the network edge to restrict excessive traffic from single IPs.
CIncrease server CPU and memory resources to handle more requests.
DImplement database query caching to reduce load on the backend.
Attempts:
2 left
💡 Hint

Think about stopping traffic before it reaches the server.

Architecture
intermediate
2:00remaining
Designing a Scalable DDoS Protection Architecture

You need to design a system to protect a global web application from DDoS attacks. Which architectural component is essential to distribute and absorb large attack traffic?

AA centralized firewall cluster located in the main data center.
BA single load balancer with auto-scaling backend servers.
CA global Content Delivery Network (CDN) with edge caching and traffic scrubbing.
DA database replica cluster to handle increased read queries.
Attempts:
2 left
💡 Hint

Consider spreading traffic geographically to reduce attack impact.

scaling
advanced
2:00remaining
Capacity Planning for DDoS Protection

Your service expects a peak legitimate traffic of 10,000 requests per second (RPS). To handle potential DDoS attacks, you want to provision protection capacity to absorb 10x that traffic. What is the minimum network bandwidth capacity you should plan for, assuming each request averages 500 bytes?

AApproximately 40 Gbps
BApproximately 4 Gbps
CApproximately 40 Mbps
DApproximately 400 Mbps
Attempts:
2 left
💡 Hint

Calculate total bytes per second for 100,000 RPS and convert to bits per second.

tradeoff
advanced
2:00remaining
Tradeoffs in Using Cloud-Based DDoS Protection Services

Which is the main tradeoff when relying on a third-party cloud DDoS protection service?

AYou must trust the provider with your traffic data and routing.
BYou have to rewrite your application to use the service APIs.
CYou lose control over your server hardware specifications.
DYou cannot scale your backend application independently.
Attempts:
2 left
💡 Hint

Think about privacy and control over data flow.

component
expert
2:00remaining
Identifying the Bottleneck in a DDoS Protection Pipeline

Consider a DDoS protection pipeline with these components in order: Network Firewall → Traffic Analyzer → Rate Limiter → Load Balancer → Application Servers. During a large attack, which component is most likely to become the bottleneck and why?

ATraffic Analyzer, because deep packet inspection is CPU intensive and can delay traffic.
BNetwork Firewall, because it inspects all packets and may have limited throughput.
CRate Limiter, because it maintains state for many IPs and can exhaust memory.
DLoad Balancer, because it distributes traffic unevenly causing server overload.
Attempts:
2 left
💡 Hint

Consider which step requires the most complex processing per packet.