220-1102 · Question #384
220-1102 Question #384: Real Exam Question with Answer & Explanation
The correct answer is A: Zombies. Internal workstations acting as sources of a DDoS attack indicate they are compromised and part of a botnet, effectively becoming "zombies" controlled by an attacker.
Question
A company is experiencing a DDoS attack. Several internal workstations are the source of the traffic. Which of the following types of infections are the workstations most likely experiencing? (Choose two.)
Options
- AZombies
- BKeylogger
- CAdware
- DBotnet
- ERansomware
- FSpyware
Explanation
Internal workstations acting as sources of a DDoS attack indicate they are compromised and part of a botnet, effectively becoming "zombies" controlled by an attacker.
Common mistakes.
- B. A keylogger captures keystrokes and is designed for espionage or data theft, not for launching DDoS attacks.
- C. Adware displays unwanted advertisements and does not typically turn a system into a platform for launching DDoS attacks.
- E. Ransomware encrypts a user's files and demands payment, and while disruptive, it does not typically turn the infected system into a DDoS attack source.
- F. Spyware secretly monitors user activity and collects information, similar to a keylogger, but is not designed to participate in DDoS attacks.
Concept tested. Malware types and DDoS attack sources
Reference. https://www.microsoft.com/en-us/security/business/security-101/what-is-ddos-attack
Topics
Community Discussion
No community discussion yet for this question.