COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which apply to a DDOS attack?
A
an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources
B
a way to hack into a network so you can run SQL code
C
A method used by hackers to track what users enter on their keyboard to steal personal information and passwords
D
Will often create a botnet to increase the amount of traffic being created
E
Will allow you to steal someone’s website and use it for yourself
Explanation: 

Detailed explanation-1: -Many DDoS attack tools such as HTTP Unbearable Load King (HULK), Slowloris, PyLoris, DAVOSET, GodenEye, Open Web Application Security Project (OWASP) HTTP Post, Low Orbit ION Cannon (LOIC), High Orbit ION Cannon (HOIC), Xoic, Tor’s Hammer, DDoSSIM (DDoS Simulator) and RUDY (R-U-Dead-Yet) are freely available.

Detailed explanation-2: -DDoS attacks use an army of zombie devices called a botnet. These botnets generally consist of compromised IoT devices, websites, and computers.

Detailed explanation-3: -Large-scale spam attacks Botnets are responsible for most internet spam attacks, including email spam, comment section spam, form spam, etc. Spam attacks are frequently used to distribute malware and make phishing attempts, and there are botnets capable of sending out tens of billions of spam messages per day.

There is 1 question to complete.