While investigating a widespread distributed denial of service attack, Matt types in the IP address of one of the attacking systems into his browser and sees the following page. What type of devices is the botnet likely composed of?
A. SCADA
B. Cloud infrastructure
C. Web servers
D. IoT
Answer: D. IoT
You might also like to view...
Which of the following protocols would be the best retrieval protocol if you wanted to use several computers and leave the messages on the e-mail server?
A) IMAP B) POP3 C) POP4 D) SMTP
Which of the following loop statements is guaranteed to iterate the body of the loop at least once?
a) while(control) body; b) do body while(control); c) for (initialize; test; update) body; d) none of the above e) all of the above
A class that specializes on the base class by adding new properties to the original list is called a _____________ .
a. parent class b. new list c. derived class d. child class e. extended list
Which of the following is texting software for sending short messages on a wireless service?
A) IM B) VoIP C) SMS D) WAP