In what type of attack does the attacker compromise multiple systems and then instruct those compromised systems, called zombies , to simultaneously flood a target system with traffic?
a. DoS
b. TCP SYN flood
c. Buffer overflow
d. DDoS
Answer: d. DDoS
You might also like to view...
The structure of the DNS database mirrors the structure of the domain namespace itself.
Answer the following statement true (T) or false (F)
How many partitions can exist on a GPT disk in Windows Server 2016?
A. 26 B. 32 C. 64 D. 128
UDP is an unreliable data delivery protocol. Why is UDP widely used on the Internet?
What will be an ideal response?
In a certain system, each process typically uses a critical section many times before another process requires it. Explain why Ricart and Agrawala’s multicast-based mutual exclusion algorithm is inefficient for this case, and describe how to improve its performance. Does your adaptation satisfy liveness condition ME2?
What will be an ideal response?