Network Defense Essentials (NDE) Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for your Network Defense Essentials Exam with multiple choice questions and detailed explanations. Enhance your cybersecurity knowledge and improve your exam score with our comprehensive practice quizzes.

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which network defense approach was implemented by Clark to combat DoS and DDoS attacks?

  1. Proactive Approach

  2. Reactive Approach

  3. Preventive Approach

  4. Detective Approach

The correct answer is: Reactive Approach

The chosen approach indicates a strategy focused on responding to network security incidents after they have occurred, particularly targeting DoS (Denial of Service) and DDoS (Distributed Denial of Service) attacks. A reactive approach involves monitoring systems for threats and intrusions, then taking action to mitigate their effects once they have been detected. By adopting a reactive approach, Clark would focus on identifying and mitigating the impacts of attacks through real-time analysis and response protocols, rather than attempting to block or prevent these attacks before they can cause disruptions. This might include deploying systems that can absorb or divert excess traffic, allowing legitimate traffic to flow while minimizing downtime during an attack. The other approaches—proactive, preventive, and detective—have their own distinct focuses and methodologies. A proactive approach seeks to anticipate and prevent attacks before they happen. A preventive approach is also similar, focusing on implementing measures to safeguard against all possible threats in advance. Meanwhile, a detective approach emphasizes the identification of breaches and vulnerabilities without taking immediate action to mitigate them. Thus, the emphasis of the chosen answer on response and mitigation aligns well with what is necessary to effectively combat DoS and DDoS threats after they've occurred.