0
0
HLDsystem_design~10 mins

DDoS protection strategies in HLD - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the first step in DDoS protection.

HLD
The initial step in DDoS protection is to [1] incoming traffic to detect unusual patterns.
Drag options to blanks, or click blank then click option'
Aignore
Bmonitor
Cblock all
Dredirect
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing to block all traffic immediately without analysis.
Ignoring traffic patterns and missing the attack signs.
2fill in blank
medium

Complete the code to specify a common method to filter malicious traffic.

HLD
A common method to filter malicious traffic is to use [1] lists that block known bad IP addresses.
Drag options to blanks, or click blank then click option'
Agrey
Ballow
Cwhite
Dblack
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing blacklist with whitelist.
Using greylist which is less common in DDoS filtering.
3fill in blank
hard

Fix the error in the description of a DDoS mitigation technique.

HLD
One effective technique is [1] routing, which distributes traffic across multiple servers to avoid overload.
Drag options to blanks, or click blank then click option'
Aanycast
Bsingle
Cunicast
Dbroadcast
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing unicast which sends traffic to a single destination.
Choosing broadcast which sends traffic to all nodes, increasing load.
4fill in blank
hard

Fill both blanks to complete the description of rate limiting in DDoS protection.

HLD
Rate limiting controls the [1] of requests a user can make and [2] excessive traffic from a single source.
Drag options to blanks, or click blank then click option'
Anumber
Bblocks
Callows
Dtime
Attempts:
3 left
💡 Hint
Common Mistakes
Using 'allows' instead of 'blocks' for the second blank.
Confusing 'time' with 'number' for the first blank.
5fill in blank
hard

Fill all three blanks to complete the description of a layered DDoS defense strategy.

HLD
A layered defense includes [1] filtering, [2] detection, and [3] response to attacks.
Drag options to blanks, or click blank then click option'
Atraffic
Banomaly
Cautomated
Dmanual
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'manual' response which is slower than automated.
Confusing anomaly detection with traffic filtering.