Which term describes an attack that uses a network of compromised devices to flood a target's resources?

Study for the CCST Cybersecurity Test. Study with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your exam!

Multiple Choice

Which term describes an attack that uses a network of compromised devices to flood a target's resources?

Explanation:
A distributed denial-of-service attack describes an assault where many compromised devices are used to overwhelm a target’s resources. The attacker taps into a botnet—numerous devices infected with malware—to generate a flood of traffic or requests, saturating bandwidth, processing power, or memory and making the service unavailable to legitimate users. Because the traffic comes from many sources, blocking a single source is less effective, which is what makes DDoS particularly disruptive. This differs from other options: phishing aims to trick people into revealing credentials; SQL injection targets insecure inputs to manipulate a database; and a man-in-the-middle attack intercepts or alters communications between two parties. Recognizing that the goal is resource exhaustion via multiple sources clarifies why DDoS is the correct term.

A distributed denial-of-service attack describes an assault where many compromised devices are used to overwhelm a target’s resources. The attacker taps into a botnet—numerous devices infected with malware—to generate a flood of traffic or requests, saturating bandwidth, processing power, or memory and making the service unavailable to legitimate users. Because the traffic comes from many sources, blocking a single source is less effective, which is what makes DDoS particularly disruptive. This differs from other options: phishing aims to trick people into revealing credentials; SQL injection targets insecure inputs to manipulate a database; and a man-in-the-middle attack intercepts or alters communications between two parties. Recognizing that the goal is resource exhaustion via multiple sources clarifies why DDoS is the correct term.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy