A DDoS (Distributed Denial of Service) attack typically involves many compromised systems—also known as bots or zombies—which together form a botnet. These systems are coordinated to flood a target with traffic, overwhelming its resources.
Evil twin attacks involve fake Wi-Fi access points.
XML injection targets web applications by inserting malicious XML.
Brute-force password attacks guess credentials but don’t require a botnet.
So, DDoS attack is the correct answer.
A Distributed Denial-of-Service (DDoS) attack often relies on a botnet, which is a network of compromised systems controlled by an attacker. These infected devices, known as bots or zombies, are used to flood a target system with excessive traffic, overwhelming its resources and making it unavailable to legitimate users
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.N10-009 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Cameron565606
1Â month, 1Â week agoUnicornFlow
1Â month, 2Â weeks ago