PrepAway - Latest Free Exam Questions & Answers

Of the following steps that describe the development of a botnet, which best describes the step that comes fir

Of the following steps that describe the development of a botnet, which best describes the step that comes first?

PrepAway - Latest Free Exam Questions & Answers

A.
Infected server sends attack commands to the botnet.

B.
Spammer pays a hacker for use of a botnet.

C.
Controller server instructs infected systems to send spam to mail servers.

D.
Malicious code is sent out that has bot software as its payload.

Explanation:
D: The creation of a botnet begins with the hacker sending systems malicious code that has the bot software as its payload. A bot is a piece of dormant code that carries out
functionality for its master. Also known as a zombie, the code can be used to forward items sent to it as in spam or attack commands. The zombie code sends a message to the
attacker indicating that a specific system has been compromised and can be used by the attacker. When an attacker has a collection of these compromised systems, it is referred to as
a botnet.
A is incorrect because before a server can act as a controlling server of the botnet, there must be compromised systems to control. These systems are created by sending malicious
code to the individual system that has bot software as its payload. Then, once installed, the bot logs in to an internet relay chat (IRC) server that it is coded to contact. This IRC server
then is used to control the botnet. (IRC is just one type of communication channel that can be used.)
B is incorrect because the development of a botnet begins with the attacker sending out malicious code that has the bot software as its payload. While a spammer could commission
an attacker to develop a botnet, that is not the first step in its actual development. In addition to renting out the botnet to spammers, hackers can use the infected systems to carry out
powerful distributed denial-of-service attacks.
C is incorrect because the last step in the use of a botnet to send spam is the controller server instructing the infected systems to send out spam messages to mail servers.
Spammers use this method so that their messages have a higher likelihood of getting through mail server spam filters since the sending IP addresses are those of the victim’s system.
Thus, the source IP addresses change constantly. This also helps ensure that the original sender is not located or identified.

One Comment on “Of the following steps that describe the development of a botnet, which best describes the step that comes fir

  1. joe says:

    1.A botnet operator sends out viruses or worms, infecting ordinary users’ computers, whose payload is a malicious application—the bot.
    2.The bot on the infected PC logs into a particular C&C server.
    3.A spammer purchases the services of the botnet from the operator.
    4.The spammer provides the spam messages to the operator, who instructs the compromised machines via the control panel on the web server, causing them to send out spam messages.




    0



    0

Leave a Reply