How are zombies used in security attacks?
- Zombies are infected machines that carry out a DDoS attack.
- Zombies are maliciously formed code segments used to replace legitimate applications.
- Zombies probe a group of machines for open ports to learn which services are running.
- Zombies target specific individuals to gain corporate or personal information.
Explanation: Zombies are infected computers that make up a botnet. They are used to deploy a distributed denial-of-service (DDoS) attack.
Exam with this question: 3.11.3 Module Quiz - Network Security Concepts
Please login or Register to submit your answer