A distributed denial-of-service attack requires zombies running on numerous machines to perform part of the attack simultaneously. If you were a system administrator looking for zombies on your network, what would you look for?
What will be an ideal response?
This is a difficult question because zombies arenot usually planted in files named “ZOMBIE.EXE,” for example. The best defense is to know what belongs on the system, from a copy of the system made right after the current system is loaded or from a file integrity checking tool such as Tripwire.
You might also like to view...
When CSS is coded in the body of the web page as an attribute of an HTML tag it is called ________.
a. Embedded b. Inline c. External d Imported
If you are developing on a Mac, it's important to ensure that you have access to a Windows system for testing.
Answer the following statement true (T) or false (F)
The very essence of randomness is that we can never know what event will occur next. _________________________
Answer the following statement true (T) or false (F)
Information that authenticates your identity on a server is known as your _____.
A. signature B. courtesy copy C. credentials D. domain name