How does a distributed denial-of-service (DDoS) attack work and why are they so dangerous?

What will be an ideal response?

A distributed denial-of-service (DDoS) launches a coordinated stream of requests against a target from many locations at the same time. Most DDoS attacks are preceded by a preparation phase in which many systems, perhaps thousands, are compromised. The compromised machines are turned into zombies(or bots), machines that are directed remotely (usually via transmitted command) by the attacker to participate in the attack. DDoS attacks are the most difficult to defend against.

Computer Science & Information Technology

You might also like to view...

A crosstab query always has at least one row heading, one column heading, and one summary field

Indicate whether the statement is true or false

Computer Science & Information Technology

Which command is used to map a network drive?

A) ipconfig B) nslookup C) netstat D) connect F) map E) net use

Computer Science & Information Technology