COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which malware comprises computers and puts them under the control of an attacker, who can control your computer from anywhere in the world?
A
Zombies AKA Bots
B
Trojan Horse
C
LIZARDSQUAD
D
Worms
Explanation: 

Detailed explanation-1: -A bot, in this case, is a device infected by malicious code, which then becomes part of a network, or net, of infected machines all controlled by a single attacker or attack group. A bot is sometimes called a zombie, and a botnet is sometimes referred to as a zombie army.

Detailed explanation-2: -Botnet Attacks: Transforming Your IT Resources into an Army of Zombies. One computer program that automatically performs a repetitive malicious task is called a bot. Multiply that program by two or more and you’ve got a botnet-and a big problem.

Detailed explanation-3: -Zombies are frequently used in denial-of-service attacks (DDoS), which refers to the saturation of websites with a multitude of computers accessing at the same time. As so many users are making requests at the same time to the server hosting the Web page, the server crashes, denying access to genuine users.

There is 1 question to complete.