A distributed denial-of-service attack requires zombies running on numerous machines to perform part of the attack simultaneously. If you were a system administrator looking for zombies on your network, what would you look for?

What will be an ideal response?

This is a difficult question because zombies arenot usually planted in files named “ZOMBIE.EXE,” for example. The best defense is to know what belongs on the system, from a copy of the system made right after the current system is loaded or from a file integrity checking tool such as Tripwire.

Computer Science & Information Technology

You might also like to view...

You can copy, modify, and redistribute ________ software without paying a fee

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following tools can be used prior to installing Windows Vista to find hardware compatibility issues?

A. Upgrade Advisor B. Window Aero C. Task Manager D. Device Manager

Computer Science & Information Technology