For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer 1

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone


Related Questions

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

What is the Full form of DC?

Answers

Answer:

Deputy Commissioner.

Answer:

the full form of DC is deputy commissioner


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate

i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?​

Answers

Answer:

In theory yes it is gonna be pretty hard but it is very possible

Select the correct answer.

Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?

A. A to F

B. A to H

C. A to M

D. A to J

Answers

Answer is  Hexadecimal  :     A.   A to F

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

A car manufacturer uses'simulation software during the design process for a new car. Which of the
following are reasons to use simulation software in this context?
1. Using simulation software can save the company money by helping to compare designs early in
the process, before prototype cars are built.
II. Using simulation software can help to identify safety issues by providing data about how different
mechanical components will interact in a wide variety of situations.
III. The manufacturer can present simulation software to customers to demonstrate different design
possibilities
А
I and II only
B
I and III only
С
II and III only
D
I, II, and III

Answers

D I,II and III is the answer i think

The reasons to use simulation software in this context are I, II, and III. The correct option is D.

What is simulation software?

The process of simulating a genuine phenomenon with a set of mathematical formulas is the foundation of simulation software. It is essentially a program that allows the user to simulate an operation and view it without really conducting it.

Simulation is a decision-making and decision-support tool. You can use simulation software to assess, compare, and optimize different designs, programs, and policies. As such, it can be used to explain and defend decisions to multiple stakeholders.

By allowing the corporation to evaluate concepts early in the process before prototype automobiles are constructed, simulation software can save the company money.

Therefore, the correct option is D, I, II, and III.

To learn more about simulation software, refer to the link:

https://brainly.com/question/16192324

#SPJ2

State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.​

Answers

Answer:

Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible  they include all information from previous revisions and updates.

Explanation:

Other Questions
2. What is the mode for the data set 13, 11, 10, 12, 14, 9,11, 8, 11?A.10B. 11C. 12D. none of the above State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________. Marsha has a bag that contains 4 green marbles, 8 yellow marbles , and 20 red marbles . If she chooses one marble from the bag, what is the probability that the marble is not red?PLEASE HELP IF YOURE GOOD AT GEOMETRY!! solutia reala a ecuatiei 4x la a doua = 6 intregi si 1/4 (dau coroana) 1. Convert the quinary number 42 into binary number. state wether the product of 3 and 9 is rational or irrational. explain your answer I was doing my khan and i got stuck6=2(y+2) Identify the following verbs by number and person by checking on the appropriate boxes.He waits.second personfirst personsingularsame form for both singular and pluralthird personplural Does the Constitution prevent the abuse of power?I need an essay for these question 3 fourths of the over 500000 lakes in Europe are found where? During a canoeing trip, it takes Raymond 4 hours to paddle 12 miles upstream. It takes him 3 hours to make the return trip paddling downstream. Find the speed of the canoe in still water A 3050 foot long road travels directly up a 550 foot tall hill. Select the equation that can be used to solve for the angle of elevation (0) from the bottom of the hill. The principle of federalism is clearly evident in the U.S. Constitution through the A.oath of the presidentB. amendment processC. branches' structureD. supremacy clause a soap bubble was slowly enlarged from radius 4cm to 6cm and amount of work necessary for enlargement is 1.5 *10 calculate the surface tension of soap bubble joules Deciding on a course of actionwas difficult for Jane.If you divide the abovesentence into two parts,the subject and the predicato,the predicate is1 Deciding2 Deciding on a courseof action3 was difficult4 was difficult for Jane5none of these Group the elements into pairs that would most likely exhibit similar chemical properties. It does not matter which pair of elements is pair 1, pair 2, or pair 3, so long as the correct elements are paired.Pair 1 Pair 2 Pair 3 Answer Bank Mg St Kr Ne+As P What story elements most clearly suggest Mead is living in a dystopiansociety in "The Pedestrian"?A. There is no government because people govern themselves.B. He is arrested for simply going for a walk.C. He cannot get married because there is so little social interaction.D. There is no work, so people only stay home and watch TV. All of the different types of electromagnetic radiation (light, x-rays, ultravioletradiation, and so on) make up theatomic spectrumelectromagnetic spectrum.sunlightspectral lines, Subtract to find the temperature changesfor the water and the metal. Suppose that g(x)= f(x)+ 6. Which statement best compares the graph of g(x) with the graph of f(x)?A. The graph of g(x) is the graph of f(x) shifted 6 units down.B. The graph of g(x) is the graph of f(x) shifted to the right.C. The graph of g(x) is the graph of f(x) shifted 6 units to the left.D. The graph of g(x) is the graph of f(x) shifted 6 units up.