In a denial-of-service (DDoS) attack, the perpetrator ____.

instructs the zombie computers to send simple access requests to target computers

changes the configuration information of the infected computers ?

sends out a huge number of spam emails to all of those in your contacts list

?refuses to accept any email from any sender

Respuesta :

M0903

Answer:

In a denial-of-service (DDoS) attack, the perpetrator instructs the zombie computers to send simple access requests to target computers

Explanation:

In a denial-of-service (DDoS) attack users with legitimate access to a server’s resources are denied access due to the server being inaccessible.Zombie computers are computers that have been compromised on the network and are being controlled remotely and used to send connection requests to the server that do not complete the three-way handshake required for  client/server communication to occur.The incomplete handshake leaves the port used unavailable for further connections. blocking authentic requests made by legitimate users.

ACCESS MORE