Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What DoS response strategy was employed by Jack to protect the network?

  1. Absorb the attack

  2. Block the attack

  3. Redirect the attack

  4. Ignore the attack

The correct answer is: Absorb the attack

Absorbing the attack as a DoS response strategy involves allowing the attack to occur while implementing measures that maintain service availability. This approach typically includes the use of tools and techniques to manage and mitigate the effects of the attack without completely interrupting the service. For example, a network might employ traffic filtering systems, load balancers, or web application firewalls to handle the incoming malicious traffic while keeping legitimate traffic flowing smoothly. By absorbing the attack, the response is focused on minimizing disruption rather than completely blocking traffic, which can sometimes lead to loss of genuine user access. This strategy is particularly useful in scenarios where the sheer volume of traffic is overwhelming. Absorbing the attack can provide necessary resilience and ensures that services remain accessible, promoting uptime in the face of adversity. Other strategies, while potentially valuable in different contexts, may not align with the chosen approach. For instance, blocking the attack might prevent all types of traffic, potentially making the service unavailable to legitimate users. Redirecting the attack could involve sending malicious traffic to a different server or resource, which might not address the root cause effectively, and ignoring the attack poses significant risk as it allows the attack to progress unchecked.