GIAC GSLC Question Answer
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He wants to test the response of a DDoS attack on the we-are-secure server. To accomplish this, he takes the following steps:
Instead of directly attacking the target computer, he first identifies a less secure network named Infosecure that contains a network of 100 computers.
He breaks this less secure network and takes control of all its computers. After completing this step, he installs a DDoS attack tool on each computer of the Infosecure network.
Finally, he uses all the computers of the less secure network to carry out the DDoS attack on the we-are-secure server.
Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.