FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What do DDoS attacks use?
A
Zombie devices
B
Ghost PCs
C
Worms
D
SD Cards
Explanation: 

Detailed explanation-1: -Zombies can be used to conduct distributed denial-of-service (DDoS) attacks, a term which refers to the orchestrated flooding of target websites by large numbers of computers at once.

Detailed explanation-2: -Zombies are frequently used in denial-of-service attacks (DDoS), which refers to the saturation of websites with a multitude of computers accessing at the same time. As so many users are making requests at the same time to the server hosting the Web page, the server crashes, denying access to genuine users.

Detailed explanation-3: -A “zombie” or “bot” is a compromised computer under the control of an attacker who often controls many other compromised machines that together make up a botnet.

Detailed explanation-4: -With distributed DoS, the attacker lines up a network of hacked machines-called “zombies” across the Internet that, upon command, launches an assault on the target. Many times, taking out the “control” machine won’t stop the attack-the “zombies” keep on assaulting the victim.

Detailed explanation-5: -A Zombie is a device connected to the Internet that is infected by malware and becomes controlled by a third party. Zombie devices are commonly involved in denial-of-service (DDoS) attacks and sending SPAM.

There is 1 question to complete.