A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer. The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective? A. The attacker should instigate a protocol-based SYN ood attack, consuming connection state tables on the retailer's servers B. The attacker should leverage a botnet to launch a Pulse Wave attack, sending high-volume traffic pulses at regular intervals C. The attacker should initiate a volumetric ood attack using a single compromised machine to overwhelm the retailer's network bandwidth D. The attacker should execute a simple ICMP ood attack from a single IP, exploiting the retailer's ICMP processing B Correct Answer: B This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer