This topic contains a solution. Click here to go to the answer

Author Question: ________ are compromised hosts running malware controlled by the hacker. A) DDoS B) ICMP C) ... (Read 116 times)

genevieve1028

  • Hero Member
  • *****
  • Posts: 601
________ are compromised hosts running malware controlled by the hacker.
 
  A) DDoS
  B) ICMP
  C) Bots
  D) None of the above

Question 2

A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.
 
  A) SYN flood
  B) Ping flood
  C) HTTP flood
  D) None of the above



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

trog

  • Sr. Member
  • ****
  • Posts: 343
Answer to Question 1

Answer: C

Answer to Question 2

Answer: B




genevieve1028

  • Member
  • Posts: 601
Reply 2 on: Jul 7, 2018
Great answer, keep it coming :)


DylanD1323

  • Member
  • Posts: 314
Reply 3 on: Yesterday
Gracias!

 

Did you know?

Anti-aging claims should not ever be believed. There is no supplement, medication, or any other substance that has been proven to slow or stop the aging process.

Did you know?

Multiple experimental evidences have confirmed that at the molecular level, cancer is caused by lesions in cellular DNA.

Did you know?

Increased intake of vitamin D has been shown to reduce fractures up to 25% in older people.

Did you know?

Medication errors are more common among seriously ill patients than with those with minor conditions.

Did you know?

Approximately 70% of expectant mothers report experiencing some symptoms of morning sickness during the first trimester of pregnancy.

For a complete list of videos, visit our video library