1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ber [7]
3 years ago
12

For what purpose do the hackers create the zombies army?

Computers and Technology
1 answer:
enyata [817]3 years ago
5 0

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

You might be interested in
The layer of the ISO/OSI responsible for source to destination delivery.
Andrej [43]

Answer:

(b) network

Explanation:

The Network Layer is the OSI Model's third layer. It is in charge of packet transport from source to destination or host to host across various networks. The layer receives data from the transport layer, adds a header to it, and sends it to the data link layer.

7 0
2 years ago
Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
kvv77 [185]

Answer and Explanation:

a)

For Go-Back-N:

  Host A sent total number of segments is 9.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2,3,4 and 5 because 2nd segment was lost.

Host B sent the number of ACKs are 8.Host B sent ACKs 1 by four times because 2nd segment was lost and sent 4ACKs with sequence numbers 2,3,4 and 5

selective repeat:

 Host A sent total number of segments is 6.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2 because 2nd segment was lost.

Host B sent the number of ACKs are 5.Host B sent four ACKs with sequence numbers 1,3,4,5 and re-sent ACK2 with sequence number 2 because 2nd segment was lost.

TCP :

Host A sent total number of segments is 6.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2 because 2nd segment was lost.

Host B sent the number of ACKs are 5.Host B sent four ACKs with sequence number 2 and There is one ACK with sequence number 6.TCP always send an ACK with expected sequence number

b) If the timeout values for all three protocol are much longer than 5*RTT,then TCP protocol successfully delivers all five data segments in shortest time interval.

 

4 0
4 years ago
Using the lab's show ip sla statistics example, what does the failure count indicate about the web server?
NeX [460]

It shows the number of times SLA ICMP (Internet Control Message Protocol), Protocol (TCP), File Transfer Protocol (FTP), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), or UDP echo operations did not manage to reach the web server.






7 0
4 years ago
Yeoo check dis out!!!!!! wait my full vid dont show hol on
kifflom [539]

Answer:

das fire

Explanation:

5 0
3 years ago
Read 2 more answers
How did technology change the world
Crank

Answer:

Technology has changed the world for the better.

Explanation:

Without technology, many of the things we take for advantage, such as, credit cards, calling people from far distances, heck even being able to call to across the world from where you are right now. Technology has revolutionized many things we use commonly on a day-to-day basis.

3 0
3 years ago
Read 2 more answers
Other questions:
  • According to the article in WikiAnswers, digital communication systems have more benefits than analog systems. They are faster a
    10·2 answers
  • Refers to the programs or instructions used to tell the computer hardware what to do.
    8·1 answer
  • A network administrator wants to logically separate web servers on the network. Which of the following network device will need
    10·2 answers
  • It is important to name your files in a variety of formats. true or false
    15·2 answers
  • Which statement describes one drive?
    6·1 answer
  • What important feature of an email gives you a clue about what the sender wants to tell you?
    12·2 answers
  • A-1 grdening supply is preparing a reprt to hand out to the customerez in pointes form only.why should the reprts writers avoid
    9·2 answers
  • Which option allows users to access the handout master to modify it?
    13·2 answers
  • Activity 1.1.4 What is Technology?
    10·1 answer
  • What are the characteristics of computer. Explain any one​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!