Distributed denial-of-service (DDOS) attacks on Internet sites are typically evoked by hackers using
which of the following?
Trojan horses are malicious or damaging code hidden within an authorized computer program.
Hackers use Trojans to mastermind DDOS attacks that affect computers that access the same
Internet site at the same moment, resulting in overloaded site servers that may no longer be able
to process legitimate requests. Logic bombs are programs designed to destroy or modify data at a
specific time in the future. Phishing is an attack, normally via e-mail, pretending to be an authorized
person or organization requesting information. Spyware is a program that picks up information from
PC drives by making copies of their contents.