This topic contains a solution. Click here to go to the answer

Author Question: ________ are compromised hosts running malware controlled by the hacker. A) DDoS B) ICMP C) ... (Read 41 times)

genevieve1028

  • Hero Member
  • *****
  • Posts: 601
________ are compromised hosts running malware controlled by the hacker.
 
  A) DDoS
  B) ICMP
  C) Bots
  D) None of the above

Question 2

A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.
 
  A) SYN flood
  B) Ping flood
  C) HTTP flood
  D) None of the above



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

trog

  • Sr. Member
  • ****
  • Posts: 343
Answer to Question 1

Answer: C

Answer to Question 2

Answer: B




genevieve1028

  • Member
  • Posts: 601
Reply 2 on: Jul 7, 2018
Gracias!


jamesnevil303

  • Member
  • Posts: 337
Reply 3 on: Yesterday
Wow, this really help

 

Did you know?

More than 20 million Americans cite use of marijuana within the past 30 days, according to the National Survey on Drug Use and Health (NSDUH). More than 8 million admit to using it almost every day.

Did you know?

More than 150,000 Americans killed by cardiovascular disease are younger than the age of 65 years.

Did you know?

According to animal studies, the typical American diet is damaging to the liver and may result in allergies, low energy, digestive problems, and a lack of ability to detoxify harmful substances.

Did you know?

Every 10 seconds, a person in the United States goes to the emergency room complaining of head pain. About 1.2 million visits are for acute migraine attacks.

Did you know?

Vital signs (blood pressure, temperature, pulse rate, respiration rate) should be taken before any drug administration. Patients should be informed not to use tobacco or caffeine at least 30 minutes before their appointment.

For a complete list of videos, visit our video library