In what type of attack does the attacker compromise multiple systems and then instruct those compromised systems, called zombies , to simultaneously flood a target system with traffic?

a. DoS
b. TCP SYN flood
c. Buffer overflow
d. DDoS


Answer: d. DDoS

Computer Science & Information Technology

You might also like to view...

The structure of the DNS database mirrors the structure of the domain namespace itself.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How many partitions can exist on a GPT disk in Windows Server 2016?

A. 26 B. 32 C. 64 D. 128

Computer Science & Information Technology

UDP is an unreliable data delivery protocol. Why is UDP widely used on the Internet?

What will be an ideal response?

Computer Science & Information Technology

In a certain system, each process typically uses a critical section many times before another process requires it. Explain why Ricart and Agrawala’s multicast-based mutual exclusion algorithm is inefficient for this case, and describe how to improve its performance. Does your adaptation satisfy liveness condition ME2?

What will be an ideal response?

Computer Science & Information Technology