Prev Question
Next Question

A computer system is no more secure than the human systems responsible for its operation.
Malicious individuals have regularly penetrated well-designed, secure computer systems by taking
advantage of the carelessness of trusted individuals, or by deliberately deceiving them.
zombie computers are being HEAVILY relied upon on by which of the following types of attack?

A.
Eavedropping

B.
DoS

C.
DDoS

D.
ATP

E.
Social Engineering

F.
None of the choices.

Explanation:
“Distributed denial of service (DDoS) attacks are common, where a large number of compromised
hosts (“”zombie computers””) are used to flood a target system with network requests, thus
attempting to render it unusable through resource exhaustion.”

Prev Question
Next Question
Tagged:

Leave a Reply

Your email address will not be published. Required fields are marked *