While investigating a widespread distributed denial of service attack, Matt types in the IP address of one of the attacking systems into his browser and sees the following page. What type of devices is the botnet likely composed of?

A. SCADA
B. Cloud infrastructure
C. Web servers
D. IoT


Answer: D. IoT

Computer Science & Information Technology

You might also like to view...

Which of the following protocols would be the best retrieval protocol if you wanted to use several computers and leave the messages on the e-mail server?

A) IMAP B) POP3 C) POP4 D) SMTP

Computer Science & Information Technology

Which of the following loop statements is guaranteed to iterate the body of the loop at least once?

a) while(control) body; b) do body while(control); c) for (initialize; test; update) body; d) none of the above e) all of the above

Computer Science & Information Technology

A class that specializes on the base class by adding new properties to the original list is called a _____________ .

a. parent class b. new list c. derived class d. child class e. extended list

Computer Science & Information Technology

Which of the following is texting software for sending short messages on a wireless service?

A) IM B) VoIP C) SMS D) WAP

Computer Science & Information Technology