Larry plans on shutting down the city’s network using BGP devices and zombies. What type of Penetration Testing is this?',

Enhance your knowledge as a Computer Hacking Forensic Investigator with the CHFI v11 Test. Use flashcards and multiple-choice questions, complete with hints and detailed explanations, to prepare effectively and ace your exam!

Multiple Choice

Larry plans on shutting down the city’s network using BGP devices and zombies. What type of Penetration Testing is this?',

Explanation:
The scenario is testing how well a network stands up to an overload and service disruption. When you use a botnet of compromised hosts (zombies) and target routing gear like BGP devices to flood and overwhelm the city’s network, the aim is to study availability, resilience, and incident response under a denial-of-service condition. That makes it a DoS Penetration Testing scenario. This type of test focuses on whether services stay available under heavy load, how quickly congestion is detected, and how defenses respond, rather than probing router vulnerabilities, insider access, or firewall rule configurations. The other options would target different objectives: router testing looks for weaknesses in routing equipment, internal testing assumes an attacker from within the network, and firewall testing examines rule sets and bypass techniques.

The scenario is testing how well a network stands up to an overload and service disruption. When you use a botnet of compromised hosts (zombies) and target routing gear like BGP devices to flood and overwhelm the city’s network, the aim is to study availability, resilience, and incident response under a denial-of-service condition. That makes it a DoS Penetration Testing scenario.

This type of test focuses on whether services stay available under heavy load, how quickly congestion is detected, and how defenses respond, rather than probing router vulnerabilities, insider access, or firewall rule configurations. The other options would target different objectives: router testing looks for weaknesses in routing equipment, internal testing assumes an attacker from within the network, and firewall testing examines rule sets and bypass techniques.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy