312-49 · Question #349
312-49 Question #349: Real Exam Question with Answer & Explanation
The correct answer is C: Zombie. In cybersecurity, an 'idle' system is referred to as a 'zombie.' This term is used in two contexts: (1) a zombie is a compromised machine that has been secretly enslaved into a botnet to carry out attacks on behalf of an attacker, and (2) in the context of idle scanning (a stealt
Question
An "idle" system is also referred to as what?
Options
- APC not connected to the Internet
- BPC not being used
- CZombie
- DBot
Explanation
In cybersecurity, an 'idle' system is referred to as a 'zombie.' This term is used in two contexts: (1) a zombie is a compromised machine that has been secretly enslaved into a botnet to carry out attacks on behalf of an attacker, and (2) in the context of idle scanning (a stealthy port scanning technique), an idle/zombie host is one with predictable IP ID sequences that an attacker exploits to perform anonymous scans. A 'bot' (D) is closely related but refers to the malicious software running on the zombie, not the host itself.
Topics
Community Discussion
No community discussion yet for this question.