This topic contains a solution. Click here to go to the answer

Author Question: ________ are compromised hosts running malware controlled by the hacker. A) DDoS B) ICMP C) ... (Read 115 times)

genevieve1028

  • Hero Member
  • *****
  • Posts: 601
________ are compromised hosts running malware controlled by the hacker.
 
  A) DDoS
  B) ICMP
  C) Bots
  D) None of the above

Question 2

A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.
 
  A) SYN flood
  B) Ping flood
  C) HTTP flood
  D) None of the above



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

trog

  • Sr. Member
  • ****
  • Posts: 343
Answer to Question 1

Answer: C

Answer to Question 2

Answer: B




genevieve1028

  • Member
  • Posts: 601
Reply 2 on: Jul 7, 2018
Wow, this really help


hramirez205

  • Member
  • Posts: 345
Reply 3 on: Yesterday
Excellent

 

Did you know?

There are 60,000 miles of blood vessels in every adult human.

Did you know?

Signs of depression include feeling sad most of the time for 2 weeks or longer; loss of interest in things normally enjoyed; lack of energy; sleep and appetite disturbances; weight changes; feelings of hopelessness, helplessness, or worthlessness; an inability to make decisions; and thoughts of death and suicide.

Did you know?

As the western states of America were settled, pioneers often had to drink rancid water from ponds and other sources. This often resulted in chronic diarrhea, causing many cases of dehydration and death that could have been avoided if clean water had been available.

Did you know?

On average, someone in the United States has a stroke about every 40 seconds. This is about 795,000 people per year.

Did you know?

When intravenous medications are involved in adverse drug events, their harmful effects may occur more rapidly, and be more severe than errors with oral medications. This is due to the direct administration into the bloodstream.

For a complete list of videos, visit our video library