uestion 1 Which of the following are zombie armies formed by a number of innocent hosts set up to perform malicious operations? Rootnets Botnets Backdoors
uestion 1
Which of the following are zombie armies formed by a number of innocent hosts set up to perform malicious operations?
Rootnets
Botnets
Backdoors
Rootkits
Backnets
Question 2
Many botnets were controlled through using what protocol?
SFTP
IRC
ICMP
SNMP
FTP
Question 3
Which of the following involves deploying a large number of compromised hosts to flood a target system?
DoS
Smurf
DDoS
MITM
Spim
Question 4
DoS attacks are for gaining unauthorized access or control of a system.
False
True
Question 5
Which of the following MAINLY applies to email that appears to be sent from a legitimate business?
Squatting
Vishing
Spimming
Spearing
Phishing
Question 6
An attacker has targeted Corp.com's employees with voicemails that attempt to acquire sensitive information by masquerading as a trustworthy entity. Which type of attack is this?
Phishing
Spear phishing
Whaling
Vishing
Step by Step Solution
There are 3 Steps involved in it
Step: 1
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started