nerdexam
CompTIACompTIA

220-1102 · Question #384

220-1102 Question #384: Real Exam Question with Answer & Explanation

The correct answer is A: Zombies. Internal workstations acting as sources of a DDoS attack indicate they are compromised and part of a botnet, effectively becoming "zombies" controlled by an attacker.

Security

Question

A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Choose two.)

Options

  • AZombies
  • BKeylogger
  • CAdware
  • DBotnet
  • ERansomware
  • FSpyware

Explanation

Internal workstations acting as sources of a DDoS attack indicate they are compromised and part of a botnet, effectively becoming "zombies" controlled by an attacker.

Common mistakes.

  • B. A keylogger captures keystrokes and is designed for espionage or data theft, not for launching DDoS attacks.
  • C. Adware displays unwanted advertisements and does not typically turn a system into a platform for launching DDoS attacks.
  • E. Ransomware encrypts a user's files and demands payment, and while disruptive, it does not typically turn the infected system into a DDoS attack source.
  • F. Spyware secretly monitors user activity and collects information, similar to a keylogger, but is not designed to participate in DDoS attacks.

Concept tested. Malware types and DDoS attack sources

Reference. https://www.microsoft.com/en-us/security/business/security-101/what-is-ddos-attack

Topics

#DDoS attack#Botnet#Zombie computer#Malware types

Community Discussion

No community discussion yet for this question.

Full 220-1102 PracticeBrowse All 220-1102 Questions