正解:B,E
A botnet is a collection of internet-connected devices that are compromised and controlled by hackers, often without the knowledge of the device owners. Hackers use botnets to launch various types of malicious attacks, such as distributed denial-of-service (DDoS), spam, phishing, crypto-mining, and more123.
To create a botnet, hackers need to infect the devices with malware that allows them to remotely control them and communicate with other infected devices. Malware can be delivered through various methods, such as phishing emails, malicious websites, drive-by downloads, exploit kits, and more12.
Therefore, one of the ways that compromises internet-connected devices and makes them vulnerable to becoming part of a botnet is B. Malware infection. Malware infection can affect any type of device that connects to the internet, such as computers, smartphones, tablets, routers, cameras, smart TVs, and more12.
Another way that compromises internet-connected devices and makes them vulnerable to becoming part of a botnet is E. Use of default credentials. Many internet-connected devices come with default usernames and passwords that are easy to guess or find online. Hackers can use these credentials to access the devices and install malware or change their settings12.
Therefore, another answer is E. Use of default credentials. Use of default credentials can affect any type of device that has a web interface or a remote login service, such as routers, cameras, printers, smart devices, and more12.
The other options are incorrect for the following reasons:
A . Deauthentication attack is a type of attack that targets wireless networks and devices. It involves sending spoofed deauthentication frames to disconnect the devices from the network or force them to reconnect. It does not compromise the devices or make them part of a botnet, but it can disrupt their communication or enable other attacks.
C . IP spoofing is a technique that involves forging the source IP address of a packet or a request. It can be used to hide the identity of the attacker, bypass security filters, or perform reflection or amplification attacks. It does not compromise the devices or make them part of a botnet, but it can make the attacks harder to trace or block.
D . Firmware corruption is a type of attack that targets the firmware of a device, which is the software that controls its basic functions and hardware. It involves modifying or replacing the firmware with malicious code that can damage the device, change its behavior, or allow remote access. It can compromise the devices or make them part of a botnet, but it is not a common or easy method, as it requires physical access or a specific vulnerability to exploit.
F . Dictionary attack is a type of attack that involves guessing passwords or encryption keys by using a list of common or likely words. It can be used to gain unauthorized access to accounts, devices, or data. It can compromise the devices or make them part of a botnet, but it is not a specific or efficient method, as it requires a lot of time and resources to perform. Reference:
1: What is a Botnet and How to Protect Your Devices in 2024 - VPNOverview.com
2: What is a botnet? When infected devices attack | CSO Online
3: What is a DDoS Botnet | Common Botnets and Botnet Tools | Imperva
4: Deauthentication attack - Wikipedia
5: IP spoofing - Wikipedia
6: Firmware - Wikipedia
7: Dictionary attack - Wikipedia