In what type of attack does the attacker compromise multiple systems and then instruct those compromised systems, called zombies , to simultaneously flood a target system with traffic?

a. DoS
b. TCP SYN flood
c. Buffer overflow
d. DDoS

Answer: d. DDoS

Computer Science & Information Technology

You might also like to view...

How many possible colors can a 12-bit image have?

a. 16,777,216 b. 512 c. 1,024 d. 4,096

Computer Science & Information Technology

The specifications of an ADT’s operations indicate ______.

a. what the operations do b. how to implement the operations c. how to store the data in the ADT d. how to carry out the operations

Computer Science & Information Technology