Boost your skills for the Ethical Hacking Test. Explore diverse questions, insightful tips, and detailed explanations. Prepare effectively for your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which practice can make a network or system more vulnerable to DoS/DDoS attacks?

  1. Regular security patching

  2. Prevent implementation of cognitive radios in the physical layer

  3. Implement strong access controls

  4. Utilize multiple network hops

The correct answer is: Prevent implementation of cognitive radios in the physical layer

The practice of preventing the implementation of cognitive radios in the physical layer can increase vulnerability to DoS/DDoS attacks because it limits the available technology options that can enhance network resilience and adaptability. Cognitive radios are intelligent wireless devices that can dynamically adjust their frequency, power, and modulation to optimize network performance and minimize interference. By maintaining flexibility and adaptability in communication, cognitive radios can help mitigate the effects of DoS/DDoS attacks by intelligently routing traffic and managing bandwidth more effectively, ultimately reducing the likelihood of overwhelming a network. When cognitive radios are not utilized, the network might rely on static configurations that can be more susceptible to targeted flooding attacks. Such attacks aim to exhaust network resources, and a rigid networking system without adaptive features may struggle to cope with sudden traffic spikes characteristic of DDoS scenarios, making it easier for malicious actors to disrupt service. In contrast, regular security patching, strong access controls, and utilizing multiple network hops are practices focused on improving security and resilience against such attacks. Regular patching ensures that known vulnerabilities are addressed, strong access controls help prevent unauthorized access, and multiple network hops can spread traffic to avoid congestion points, all contributing to a more secure and robust network infrastructure. Thus, avoiding the implementation of cognitive radios limits these protective