A distributed denial-of-service attack requires zombies running on numerous machines to perform part of the attack simultaneously. If you were a system administrator looking for zombies on your network, what would you look for?

What will be an ideal response?


This is a difficult question because zombies arenot usually planted in files named “ZOMBIE.EXE,” for example. The best defense is to know what belongs on the system, from a copy of the system made right after the current system is loaded or from a file integrity checking tool such as Tripwire.

Computer Science & Information Technology

You might also like to view...

When CSS is coded in the body of the web page as an attribute of an HTML tag it is called ________.

a. Embedded b. Inline c. External d Imported

Computer Science & Information Technology

If you are developing on a Mac, it's important to ensure that you have access to a Windows system for testing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The very essence of randomness is that we can never know what event will occur next. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Information that authenticates your identity on a server is known as your _____.

A. signature B. courtesy copy C. credentials D. domain name

Computer Science & Information Technology