Which service should be blocked to help prevent Denial of Service attacks?

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

To effectively mitigate Denial of Service (DoS) attacks, blocking the echo service is a sound strategy. The echo service, which operates through the Internet Control Message Protocol (ICMP) echo requests, can be exploited in flood attacks. In such attacks, an overwhelming number of echo requests lead to network congestion, making legitimate traffic unable to reach its destination or causing systems to crash due to resource exhaustion. By blocking this service, you can reduce the risk of such flood-based DoS attacks, which aim to disrupt the normal functioning of targeted systems.

Other services, while potentially vulnerable to different forms of attacks or misuse, do not inherently facilitate the same level of disruption as the echo service in the context of Denial of Service attacks. For example, FTP, SSH, and DNS can be targeted in specific ways, but their blocking would not directly address the flooding technique commonly associated with echo requests. Therefore, focusing on blocking the echo service is a strategic approach to reduce the risk of DoS attacks.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy