Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

QuestionsCategory: GISFPeter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?
Admin Staff asked 6 months ago
Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

A. Teardrop attack

B. SYN flood attack

C. Ping of Death attack

D. DDoS attack








 

Suggested Answer: D



This question is in GISF exam 
For getting GIAC Information Security Fundamentals (GISF) Certificate

Disclaimers:
The website is not related to, affiliated with, endorsed or authorized by GIAC.
Trademarks, certification & product names are used for reference only and belong to GIAC.

Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.