During a DoS attack, attackers often flood the victim system with which type of requests?

Prepare for the EC-Council Certified Incident Handler Test with an interactive quiz. Study with flashcards, MCQs, hints, and explanations. Ace your test!

During a Denial of Service (DoS) attack, attackers typically flood the victim system with non-legitimate service requests. This means that the requests are designed to overwhelm the system by consuming its resources without providing any valid service purpose.

Non-legitimate requests can include a variety of malicious traffic, such as random data packets or requests for services that the attacker knows cannot be fulfilled by the system efficiently. The goal of this flooding is to exhaust the system's resources, such as bandwidth, memory, or processing power, leading to legitimate users being unable to access the services.

Legitimate service requests differ because they come from users who are seeking valid access to the system's resources, while system resources and websites are not types of requests but rather the targets or components involved in the attack. Thus, focusing on non-legitimate service requests accurately captures the nature of the malicious intent behind a DoS attack.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy