Chapter 14: The Botnet Problem
The bot master develops his/her bot software, often reusing existing code and adding custom features. This is known as: A. Infection B. Rallying C. Creation D. Waiting E. Executing
C. Creation
Once a victim machine becomes infected with a bot, it is known as a: A. Vampire B. Werewolf C. Ghost D. Succubus E. Zombie
C. Ghost
A collection of compromised Internet computers being controlled remotely by attackers for malicious and illegal purposes is known as a: A. Malware B. Spyware C. Botmaster D. Botnet E. Bot-herder
D. Botnet
After infection, the bot starts up for the first time and attempts to contact its C&C server(s) in a process known as: A. Infection B. Creation C. Rallying D. Waiting E. Executing
E. Executing
Having joined the C&C network, the bot waits for commands from the bot master. This is known as: A. Infection B. Creation C. Rallying D. Executing E. Waiting
E. Waiting
1. True or False? A botnet is a collection of compromised Internet computers being controlled remotely by at- tackers for malicious and legal purposes
False
True or False? After infection, the bot starts up for the first time and attempts to contact its C&C server(s) in a process known as waiting
False
True or False? Centralized botnets use a double entity(a host or a small collection of hosts) to manage all bot members
False
True or False? The attacker exploits a vulnerability in a running service to automatically gain access and install his software without any user interaction
True
True or False? The person controlling a bot net is known as the bot master or bot-herder
True