Which Trojan category is designed to form a botnet for carrying out DDoS attacks?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which Trojan category is designed to form a botnet for carrying out DDoS attacks?

Explanation:
The main idea here is a Trojan designed to build and control a botnet specifically for carrying out DDoS attacks. A DDoS Trojan includes the functionality to compromise multiple machines, enroll them into a botnet, and coordinate attack traffic, usually via a command-and-control channel, to overwhelm a target. That makes it the best fit for the category described. IoT Trojans target internet-connected devices more broadly and may be used for DDoS, but the category isn’t defined by the DDoS goal alone. A wrapper is a technique to conceal payloads, not a category focused on botnets or DDoS. Mirai is a notable IoT botnet malware, but it’s an example, not the category itself.

The main idea here is a Trojan designed to build and control a botnet specifically for carrying out DDoS attacks. A DDoS Trojan includes the functionality to compromise multiple machines, enroll them into a botnet, and coordinate attack traffic, usually via a command-and-control channel, to overwhelm a target. That makes it the best fit for the category described. IoT Trojans target internet-connected devices more broadly and may be used for DDoS, but the category isn’t defined by the DDoS goal alone. A wrapper is a technique to conceal payloads, not a category focused on botnets or DDoS. Mirai is a notable IoT botnet malware, but it’s an example, not the category itself.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy