1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
1 year ago
6

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually ref

erred to as which of the following?
Zombies
Computers and Technology
1 answer:
bazaltina [42]1 year ago
4 0
<h3>What is DDoS Attack?</h3>

In a DDoS attack, a group of computers work together to make it difficult for people using a particular resource (like a website or server) by flooding its resources with traffic.

We want to make sure that our target is a good one. When there are a lot of incoming messages, connection requests, or packets that are not correct, the target system can't handle it and slows down or even crashes. This can cause problems for people trying to use the system, or for systems that are using the target system. A DDoS attack is when someone sends a lot of traffic to a website or computer system, usually in an attempt to make it crash.

<h3>What is Zombie?</h3>

computer or network device under the control of an intruder is known as a Zombie, or bot. The attacker sets up a server to control the network of bots. The person in charge of a botnet is called the botmaster.

A botnet is a group of computers that have been infected with a virus, and are working together to do the user's bidding. The first computer to be infected is called the "botmaster", and it controls the other machines in the botnet.

Thus, compromised computers are usually known as Zombies

To Know More About DDoS Attack, Check Out

brainly.com/question/29238912

#SPJ4

You might be interested in
Read the sentence. Piles of discarded trash litter the cobblestones of the quaint brick alley. Which image best shows a visualiz
Snezhnost [94]

Answer:

C

Explanation:

JUST DID IT

3 0
3 years ago
Which of the following were input devices for early portable computers?
nordsb [41]

Answer:

Notebooks

Explanation:

The answer is Notebooks

5 0
3 years ago
Which of the following is not a concern that has come out of the widespread adoption of the Internet?
slamgirl [31]

Answer:

The correct option is;

Selecting the correct browser to use for the sites you want to visit

Explanation:

Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient

Increased anonymity

Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.

Unauthorized sharing of copyrighted information

The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online

Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.

5 0
3 years ago
Convert the following 8­bit binary numbers in two's complement format to decimal (If the number is negative, include the minus s
olchik [2.2K]
Ahhh we rjfydyxtxyztxhxhxhxtzgxgxgxtxftxtxtxtxt gc
6 0
3 years ago
Create pseudocode to compute the volume of a sphere. Use the formula: V= (4/3)* π r3 where π is equal to 3.1416 approximately, w
MA_775_DIABLO [31]

Answer:

In geometry, the area enclosed by a circle of radius r is πr2. Here the Greek letter π represents a constant, approximately equal to 3.14159, which is equal to the ratio of the circumference of any circle to its diameter.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which tab is used to edit objects on the slide master and layouts
    10·1 answer
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • What's is the contribution of technology to the country?
    15·1 answer
  • Why were spices very important 500 yr and what did people use them for
    8·1 answer
  • Programming a computer to win at chess
    7·2 answers
  • Difference between second and third generation of computer<br>​
    14·1 answer
  • It is common for people to name directories as dir1, dir2, and so on. When there are ten or more directories, the operating syst
    8·1 answer
  • Only now _______ why you didn't tell me.​
    14·2 answers
  • 16. Your character qualities never change. (3 points)<br> A. True<br> B. False
    6·2 answers
  • What are the two different types of dns requests?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!