Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

uestion 1 Which of the following are zombie armies formed by a number of innocent hosts set up to perform malicious operations? Rootnets Botnets Backdoors

uestion 1

Which of the following are zombie armies formed by a number of innocent hosts set up to perform malicious operations?

Rootnets

Botnets

Backdoors

Rootkits

Backnets

Question 2

Many botnets were controlled through using what protocol?

SFTP

IRC

ICMP

SNMP

FTP

Question 3

Which of the following involves deploying a large number of compromised hosts to flood a target system?

DoS

Smurf

DDoS

MITM

Spim

Question 4

DoS attacks are for gaining unauthorized access or control of a system.

False

True

Question 5

Which of the following MAINLY applies to email that appears to be sent from a legitimate business?

Squatting

Vishing

Spimming

Spearing

Phishing

Question 6

An attacker has targeted Corp.com's employees with voicemails that attempt to acquire sensitive information by masquerading as a trustworthy entity. Which type of attack is this?

Phishing

Spear phishing

Whaling

Vishing

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction To Data Mining

Authors: Pang Ning Tan, Michael Steinbach, Vipin Kumar

1st Edition

321321367, 978-0321321367

More Books

Students explore these related Databases questions