In what type of attack does the attacker compromise multiple systems and then instruct those compromised systems, called zombies , to simultaneously flood a target system with traffic?
a. DoS
b. TCP SYN flood
c. Buffer overflow
d. DDoS
Answer: d. DDoS
Computer Science & Information Technology
You might also like to view...
How many possible colors can a 12-bit image have?
a. 16,777,216 b. 512 c. 1,024 d. 4,096
Computer Science & Information Technology
The specifications of an ADT’s operations indicate ______.
a. what the operations do b. how to implement the operations c. how to store the data in the ADT d. how to carry out the operations
Computer Science & Information Technology