Management at your company has become increasingly concerned about botnet attacks. After researching the issue, you decide to monitor certain conditions to help detect if a botnet attack is underway. Which trend is the best indicator of this type of attack?

A. connection attempt increase on Internet-facing Web servers
B. TCP and UDP traffic increase during off-peak hours
C. port-scanning attempt increase over a 24-hour period
D. unsuccessful login increase during peak hours


B
Explanation: The best indicator of those given of a botnet attack is a TCP and UDP traffic increase during off-peak hours.
None of the other trends are as likely to indicate a botnet attack as the TCP and UDP traffic increase.

Computer Science & Information Technology

You might also like to view...

When running a script such as bkup (page 682) to back up files on a remote system, how could you rotate (rename) files on a remote system?

What will be an ideal response?

Computer Science & Information Technology

The process of combining two or more values to create a single value is called _________

A) consolidate B) concatenate C) update D) union

Computer Science & Information Technology

Map the high-level data model shown below to a set of relational tables. Identify primary, alternate, and foreign keys.

What will be an ideal response?

Computer Science & Information Technology

The WordPad program creates files in ____ format.

A. DOC B. DOCX C. RTF D. USB

Computer Science & Information Technology