This topic contains a solution. Click here to go to the answer

Author Question: ________ are compromised hosts running malware controlled by the hacker. A) DDoS B) ICMP C) ... (Read 93 times)

genevieve1028

  • Hero Member
  • *****
  • Posts: 601
________ are compromised hosts running malware controlled by the hacker.
 
  A) DDoS
  B) ICMP
  C) Bots
  D) None of the above

Question 2

A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.
 
  A) SYN flood
  B) Ping flood
  C) HTTP flood
  D) None of the above



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

trog

  • Sr. Member
  • ****
  • Posts: 343
Answer to Question 1

Answer: C

Answer to Question 2

Answer: B




genevieve1028

  • Member
  • Posts: 601
Reply 2 on: Jul 7, 2018
:D TYSM


daiying98

  • Member
  • Posts: 354
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

According to the American College of Allergy, Asthma & Immunology, more than 50 million Americans have some kind of food allergy. Food allergies affect between 4 and 6% of children, and 4% of adults, according to the CDC. The most common food allergies include shellfish, peanuts, walnuts, fish, eggs, milk, and soy.

Did you know?

Vaccines prevent between 2.5 and 4 million deaths every year.

Did you know?

There are 20 feet of blood vessels in each square inch of human skin.

Did you know?

According to the National Institute of Environmental Health Sciences, lung disease is the third leading killer in the United States, responsible for one in seven deaths. It is the leading cause of death among infants under the age of one year.

Did you know?

The word drug comes from the Dutch word droog (meaning "dry"). For centuries, most drugs came from dried plants, hence the name.

For a complete list of videos, visit our video library