COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____ are an additional layer of compromised hosts that are used to manage large groups of bots.
A
Botnets
B
Handlers
C
Phatbots
D
None of the above
Explanation: 

Detailed explanation-1: -A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.

Detailed explanation-2: -There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include: Buffer overflow attacks – the most common DoS attack.

There is 1 question to complete.