NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
____ are compromised hosts running malware controlled by the hacker.
|
DDoS
|
|
ICMP
|
|
Bots
|
|
None of the above
|
Explanation:
Detailed explanation-1: -A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
Detailed explanation-2: -Ping of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
There is 1 question to complete.