Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following best describes a DDoS attack?

  1. An attempt to make a machine or network resource unavailable

  2. Gaining unauthorized access to sensitive data

  3. Infecting a system with malicious software

  4. Exfiltrating data for financial gain

The correct answer is: An attempt to make a machine or network resource unavailable

A Distributed Denial of Service (DDoS) attack aims to render a machine or network resource unavailable to its intended users. This is typically achieved by overwhelming the target with a flood of traffic from multiple compromised sources, making it difficult or impossible for legitimate users to access the service. The purpose of a DDoS attack is to disrupt normal operations, often causing considerable downtime and impacting the target's ability to function. The other options describe different types of cybersecurity threats. Unauthorized access to sensitive data refers to breaches and hacking incidents, while infecting a system with malicious software pertains to the spread of malware. Exfiltrating data for financial gain is related to data theft, which is another form of malicious activity. However, these do not involve the denial of service aspect that characterizes a DDoS attack.