This topic contains a solution. Click here to go to the answer

Author Question: ________ are compromised hosts running malware controlled by the hacker. A) DDoS B) ICMP C) ... (Read 65 times)

genevieve1028

  • Hero Member
  • *****
  • Posts: 601
________ are compromised hosts running malware controlled by the hacker.
 
  A) DDoS
  B) ICMP
  C) Bots
  D) None of the above

Question 2

A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic.
 
  A) SYN flood
  B) Ping flood
  C) HTTP flood
  D) None of the above



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

trog

  • Sr. Member
  • ****
  • Posts: 343
Answer to Question 1

Answer: C

Answer to Question 2

Answer: B




genevieve1028

  • Member
  • Posts: 601
Reply 2 on: Jul 7, 2018
Excellent


xiaomengxian

  • Member
  • Posts: 311
Reply 3 on: Yesterday
:D TYSM

 

Did you know?

Individuals are never “cured” of addictions. Instead, they learn how to manage their disease to lead healthy, balanced lives.

Did you know?

Vaccines prevent between 2.5 and 4 million deaths every year.

Did you know?

Medication errors are more common among seriously ill patients than with those with minor conditions.

Did you know?

Recent studies have shown that the number of medication errors increases in relation to the number of orders that are verified per pharmacist, per work shift.

Did you know?

The highest suicide rate in the United States is among people ages 65 years and older. Almost 15% of people in this age group commit suicide every year.

For a complete list of videos, visit our video library