In what way are zombies used in security attacks?

IT Questions BankCategory: CCNA CyberOpsIn what way are zombies used in security attacks?

In what way are zombies used in security attacks?

  • They target specific individuals to gain corporate or personal information.
  • They probe a group of machines for open ports to learn which services are running.
  • They are maliciously formed code segments used to replace legitimate applications.
  • They are infected machines that carry out a DDoS attack.

Explanation: Zombies are infected computers that make up a botnet. The zombies are used to deploy a distributed denial of service (DDoS) attack.

Exam with this question: CCNA 3 v7 Modules 3 – 5 Exam Answers
Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 6 Exam Answers
Exam with this question: Module 2: Quiz – Network Threats Network Security
Exam with this question: CyberOps Associate (Version 1.0) - Module 14: Common Threats and Attacks Quiz Answers
Exam with this question: Introduction to Cybersecurity Chapter 2 Quiz

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x