CISA Certified Information Systems Auditor – Question1787

A computer system is no more secure than the human systems responsible for its operation. Malicious individuals have regularly penetrated well-designed, secure computer systems by taking advantage of the carelessness of trusted individuals, or by deliberately deceiving them. zombie computers are being HEAVILY relied upon on by which of the following types of attack?

A.
Eavedropping
B. DoS
C. DDoS
D. ATP
E. Social Engineering
F. None of the choices.

Correct Answer: C

Explanation:

Explanation: “Distributed denial of service (DDoS) attacks are common, where a large number of compromised hosts (“”zombie computers””) are used to flood a target system with network requests, thus attempting to render it unusable through resource exhaustion.”