Question: a. What is a D DoS attack? 1a.) Flooding a host with traffic so that it cannot serve its legitimate users is a ______ attack.

a. What is a D DoS attack?

1a.) Flooding a host with traffic so that it cannot serve its legitimate users is a ______ attack.

a. Hacking

b. Virus

c. Malware

d. DoS


b. In what two ways was the KrebsOnSecurity.com D DoS attack unusual?

1b.) The KrebsOnSecurity.com attack ______.

a. Was a denial of service attack

b. Used IoT devices to attack the site

c. Both A and B

d. Neither A nor B


c. What do we mean by the “Internet of Things”?

1c.) Internet communication that does not involve a human is referred to with the term ______.

a. World Wide Web

b. Impersonal

c. Anonymous

d. LoT


d. What happens when a host cannot reach a Domain Name System server?

1d.) If a host cannot reach a DNS server, it ______.

a. Cannot have a host name

b. Will have to rely on host names

c. Will need to use a DHCP server

d. Is unlikely to be able to communicate with most server hosts


e. What specific security weakness did the Mirai malware use to propagate from machine to machine?

1e.) The Mirai bots in the KrebsOnSecurity.com attack were ______.

a. Client hosts

b. Server hosts

c. LoT devices

d. All of the above

Step by Step Solution

3.58 Rating (165 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a A distributed denialofservice attack tries to reduce or eliminate a resources ability to serve its ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!