Management at your company has become increasingly concerned about botnet attacks. After researching the issue, you decide to monitor certain conditions to help detect if a botnet attack is underway. Which trend is the best indicator of this type of attack?
A. connection attempt increase on Internet-facing Web servers
B. TCP and UDP traffic increase during off-peak hours
C. port-scanning attempt increase over a 24-hour period
D. unsuccessful login increase during peak hours
B
Explanation: The best indicator of those given of a botnet attack is a TCP and UDP traffic increase during off-peak hours.
None of the other trends are as likely to indicate a botnet attack as the TCP and UDP traffic increase.
You might also like to view...
When running a script such as bkup (page 682) to back up files on a remote system, how could you rotate (rename) files on a remote system?
What will be an ideal response?
The process of combining two or more values to create a single value is called _________
A) consolidate B) concatenate C) update D) union
Map the high-level data model shown below to a set of relational tables. Identify primary, alternate, and foreign keys.
What will be an ideal response?
The WordPad program creates files in ____ format.
A. DOC B. DOCX C. RTF D. USB