1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skad [1K]
3 years ago
9

What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It

involves technological and physical systems to launch the attack. It involves multiple systems to launch the attack?
Computers and Technology
1 answer:
makvit [3.9K]3 years ago
8 0

Solution:

A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.

DDoS attacks have been carried out by diverse threat actors, ranging from individual criminal hackers to organized crime rings and government agencies. In certain situations, often ones related to poor coding, missing patches or generally unstable systems, even legitimate requests to target systems can result in DDoS-like results.

It works as:

In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master system identifies other vulnerable systems and gains control over them by either infecting the systems with malware or through bypassing the authentication controls (i.e., guessing the default password on a widely used system or device).

A computer or networked device under the control of an intruder is known as a zombie, or bot. The attacker creates what is called a command-and-control server to command the network of bots, also called a botnet. The person in control of a botnet is sometimes referred to as the bot master.

Botnets can be comprised of almost any number of bots; botnets with tens or hundreds of thousands of nodes have become increasingly common, and there may not be an upper limit to their size. Once the botnet is assembled, the attacker can use the traffic generated by the compromised devices to flood the target domain and knock it offline.


You might be interested in
Explain the difference between using the int type and the double type for numbers.
MaRussiya [10]
They have different semantics, <span>addition to having different semantics from </span>double<span>, </span>int<span> arithmetic is generally faster, and the smaller size (32 bits vs. 64 bits) leads to more efficient use of caches and data transfer bandwidth.....
Did That Help You In Anyway </span>
6 0
4 years ago
A(n) ________ is a private network that uses a public network (usually the _____) to connect securely to remote sites.
Paul [167]

A LAN VPN is a private network that uses a public network (usually the internet) to connect securely to remote sites.  

Thank me later. :)

8 0
3 years ago
what are the two capabilities of the internet that promote and sustain customer relationships? multiple choice question. anywher
nika2105 [10]

The two capabilities of the internet that promote and sustain customer relationships is option C: interactivity and individuality.

<h3>What can the internet do and how does it function?</h3>

A global computer network called the internet transmits many types of data and media between linked devices. It functions by utilizing a packet-routing network that complies with Transport Control Protocol (TCP) and Internet Protocol (IP).

Therefore, Note that Web interactivity describes interactive elements that are integrated into websites and allow for the exchange of information between users of technology or between users of communication technology.

Learn more about internet  from

brainly.com/question/2780939
#SPJ1

5 0
1 year ago
1. Write Python code to implement the following:
ZanzabumX [31]

Answer: no why huh hmmmmmmm

Explanation:

6 0
2 years ago
Read 2 more answers
The principle of time preference requries a larger payment in the future than the present. Which situation best illustrates this
gladu [14]
The answer is letter C.
3 0
3 years ago
Other questions:
  • Question 1:
    15·1 answer
  • Which internet site end in .com​
    10·2 answers
  • Which of these statements sums up why the computer is the most visible and
    15·1 answer
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • The homepage is the page your browser displays when you first start the program
    12·1 answer
  • Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6
    13·1 answer
  • It's the same drop-down answers for both.
    15·1 answer
  • Draw a flowchart and write the algorithm to find even number between 1 to 50​
    7·1 answer
  • Select all the correct answers.
    5·1 answer
  • Creating a website is called web ________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!