Answer:
In a denial-of-service (DDoS) attack, the perpetrator instructs the zombie computers to send simple access requests to target computers
Explanation:
In a denial-of-service (DDoS) attack users with legitimate access to a server’s resources are denied access due to the server being inaccessible.Zombie computers are computers that have been compromised on the network and are being controlled remotely and used to send connection requests to the server that do not complete the three-way handshake required for client/server communication to occur.The incomplete handshake leaves the port used unavailable for further connections. blocking authentic requests made by legitimate users.