The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

  • Post author:
  • Post category:Q&A
  • Reading time:6 mins read
  • Post last modified:March 14, 2025

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

  • adware
  • DDoS
  • phishing
  • social engineering
  • spyware

For more Questions and Answers:

Introduction to Cybersecurity Course Final Exam Answers Full 100%

IT Essentials 8 Chapter 13 Exam Answers Full 100%

CyberOps Associate Modules 13 – 17: Threats and Attacks Group Exam Answers Full 100%


DDoS (Distributed Denial-of-Service) Attack

The correct answer is DDoS (Distributed Denial-of-Service). A DDoS attack occurs when multiple systems flood a targeted server, service, or network with an overwhelming amount of traffic, causing it to slow down or become completely unavailable to legitimate users.

Understanding a DDoS Attack

A Distributed Denial-of-Service (DDoS) attack is a type of cyberattack where an attacker uses multiple systems, often compromised devices forming a botnet, to send an excessive number of requests to a target web server. The goal is to exhaust the server’s resources, making it unable to respond to legitimate traffic. In this case, the IT department reports that the company’s web server is receiving a high volume of web page requests from different locations at the same time, which matches the characteristics of a DDoS attack.


How a DDoS Attack Works

DDoS attacks typically follow a structured process that involves different stages:

1. Botnet Creation

Attackers first create or rent a botnet, which is a network of infected devices (computers, IoT devices, servers) controlled remotely using malware. The owners of these devices are usually unaware that their systems have been compromised.

2. Attack Coordination

The attacker instructs all compromised devices in the botnet to send a flood of requests or malicious traffic to the target server. These devices may come from various geographical locations, making it difficult to block the attack by filtering specific IP addresses.

3. Overloading the Target Server

As the server receives a massive volume of requests simultaneously, it struggles to process legitimate user requests. Eventually, the server may slow down, crash, or become completely unresponsive, causing a denial of service to real users.


Types of DDoS Attacks

DDoS attacks can be classified into different types based on the method used to disrupt the target system:

1. Volumetric Attacks

These attacks focus on overwhelming the target with an excessive amount of traffic. Examples include:

  • UDP Floods – Large amounts of User Datagram Protocol (UDP) packets are sent to random ports on a target server.
  • ICMP Floods (Ping Floods) – The attacker sends a large number of ICMP echo request packets (pings) to exhaust network resources.

2. Protocol-Based Attacks

These attacks exploit weaknesses in network protocols to deplete server resources. Examples include:

  • SYN Floods – The attacker sends numerous connection requests to a server but never completes the handshake, leaving the server with half-open connections.
  • ACK Floods – An attacker floods the target with TCP acknowledgment packets to exhaust the system.

3. Application Layer Attacks

These attacks target the application layer (Layer 7) of the OSI model, focusing on disrupting web applications. Examples include:

  • HTTP Flood – Attackers send a massive number of HTTP requests to overwhelm the web server.
  • Slowloris – Attackers open multiple connections to a web server and keep them open for as long as possible to exhaust server resources.

Why DDoS Attacks are Dangerous

DDoS attacks pose significant threats to businesses and organizations because they can:

  1. Disrupt Business Operations – When a website or online service is down, customers and employees cannot access critical resources, leading to lost revenue.
  2. Damage Reputation – Customers may lose trust in a company if its website frequently becomes inaccessible.
  3. Financial Losses – Businesses may suffer financial losses due to downtime, lost transactions, and recovery costs.
  4. Serve as a Distraction – Sometimes, DDoS attacks are used to divert attention while attackers carry out more severe security breaches, such as data theft.

How to Protect Against DDoS Attacks

Organizations must implement security measures to mitigate and prevent DDoS attacks. Here are some strategies:

1. Implement DDoS Protection Services

Many cloud-based security providers, such as Cloudflare, AWS Shield, and Akamai, offer DDoS protection that can detect and mitigate attacks before they affect the network.

2. Use Load Balancers

Load balancers distribute incoming traffic across multiple servers, preventing a single server from being overwhelmed by an attack.

3. Rate Limiting and Traffic Filtering

Setting rate limits on web servers can restrict the number of requests from a single IP address, helping to prevent excessive traffic from a DDoS attack.

4. Deploy Web Application Firewalls (WAF)

A Web Application Firewall (WAF) can filter and block malicious traffic before it reaches the target application.

5. Enable Anti-DDoS Features on Routers and Firewalls

Configuring firewalls and routers to block traffic from known malicious sources can help reduce the impact of an attack.

6. Monitor Traffic Patterns

Using network monitoring tools can help detect unusual spikes in traffic, allowing IT teams to respond quickly to a potential attack.

7. Have an Incident Response Plan

Organizations should develop an incident response plan to handle DDoS attacks effectively. This includes identifying key personnel, defining roles, and having a backup plan to minimize downtime.


Comparison with Other Attack Types

To clarify why the correct answer is DDoS and not the other options, here’s a comparison:

Attack Type Definition Why It’s Not the Correct Answer
Adware Unwanted software that displays advertisements on a computer. The scenario describes a high volume of web traffic, not intrusive ads.
Phishing A cyberattack where attackers trick users into revealing sensitive information, such as passwords. The attack does not involve deception or fraudulent messages.
Social Engineering Manipulating people into revealing confidential information. There is no indication that attackers are tricking employees into giving out access.
Spyware Malware that secretly collects user data and sends it to attackers. The attack is affecting the web server, not individual user devices.

Clearly, DDoS is the correct answer because the attack involves overwhelming the company’s web server with excessive requests from multiple locations.


Conclusion

A DDoS (Distributed Denial-of-Service) attack is a serious cybersecurity threat that disrupts the availability of web servers by flooding them with excessive traffic. This attack type can cause financial losses, reputational damage, and operational disruptions. Organizations must implement strong security measures, such as DDoS protection services, firewalls, and traffic monitoring, to defend against such attacks.

By understanding how DDoS attacks work and implementing preventive strategies, businesses can protect their digital infrastructure from cybercriminals attempting to take down their web services.