Final answer:
The correct answer is 'd) All of the above'. Hackers use DDoS, Drive-by Downloads, Malware, Malvertising, Phishing, and Password attacks to infiltrate systems. To combat hacking, robust cybersecurity measures and user education are necessary.
Step-by-step explanation:
Among the famous and common cyber-attacks used by hackers to infiltrate a user's system are DDoS (Distributed Denial of Service) attacks, Drive-by Downloads, Malware, Malvertising, Phishing, and Password attacks. Therefore, the correct answer to the question is d) All of the above. Hackers deploy these methods to break into systems, steal sensitive data, cause disruptions, or spread disinformation. Tactics vary from overwhelming a network to make it inoperable to tricking individuals into providing personal information or credentials.
Hackers use these tactics for a variety of reasons. They may seek to steal financial information, personal identities, intellectual property, or government secrets, which they can use for fraudulent activities, espionage, or selling on the dark web. Additionally, militant groups and governments have weaponized cyberspace to disrupt or spy on their opponents.
To reduce the risk of hacking, organizations and individuals can employ robust cybersecurity measures such as strong, unique passwords, regular software updates, anti-virus protection, and user education about the risks and signs of cyber-attacks.