COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Sending requests to a single server using hijacked machines is an example of ____ [1-3]
A
Phishing
B
DDOS
C
Worm
D
Virus
Explanation: 

Detailed explanation-1: -Vulnerability management is the process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them. This, implemented alongside with other security tactics, is vital for organizations to prioritize possible threats and minimizing their “attack surface."

Detailed explanation-2: -A botnet is a collection of internet-connected devices, which may include personal computers (PCs), servers, mobile devices and internet of things (IoT) devices, that are infected and controlled by a common type of malware, often unbeknownst to their owner.

Detailed explanation-3: -Certified Ethical Hacker (CEH).

There is 1 question to complete.