In this attack, the attacker will do a port scan and look for an open port or a software application that is vulnerable to an attack. The machine is hacked (attacked) and distributes the malicious software.

What will be an ideal response?


Distributed Denial of Service Attacks

Computer Science & Information Technology

You might also like to view...

In the Revisions task pane, comment markers are horizontal ____.

A. triangles B. squares C. circles D. rectangles

Computer Science & Information Technology

Individual slides can be saved as image files so they can be shared as pictures or inserted into other programs

Indicate whether the statement is true or false

Computer Science & Information Technology

A line that surrounds a paragraph, page, or a table is a:

A) border. B) box. C) object. D) WordArt.

Computer Science & Information Technology

A field used to connect one table logically with another table is called a ____ field.

A. common B. primary C. composite D. data

Computer Science & Information Technology