Which of the following typically uses compromised systems that become part of a bot network?
A.
Evil twin attack
B.
DDoS attack
C.
XML injection
D.
Brute-force password attack
The Answer Is:
B
This question includes an explanation.
Explanation:
A DDoS (Distributed Denial of Service) attack is often launched from botnets — networks of compromised systems (bots or zombies) under the control of an attacker. These devices flood the target with traffic to disrupt services.
A. Evil twin attack is a wireless spoofing method.
C. XML injection targets web applications.
D. Brute-force attacks repeatedly guess passwords but don't involve a botnet by default.
???? Reference:
CompTIA Network+ N10-009 Official Objectives: 4.2 – Identify common security threats and vulnerabilities.
N10-009 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 60% Discount on All Products,
Use Coupon: "8w52ceb345"