How are zombies used in security attacks?

IT Questions BankCategory: CCNA 3 v7How are zombies used in security attacks?

How are zombies used in security attacks?

  • Zombies are infected machines that carry out a DDoS attack.
  • Zombies are maliciously formed code segments used to replace legitimate applications.
  • Zombies probe a group of machines for open ports to learn which services are running.
  • Zombies target specific individuals to gain corporate or personal information.

Explanation: Zombies are infected computers that make up a botnet. They are used to deploy a distributed denial-of-service (DDoS) attack.

Exam with this question: 3.11.3 Module Quiz - Network Security Concepts

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments