Multiple Choice
When a computer hacker uses multiple compromised computers to carry out a DDOS attack,the compromised computers are usually referred to as which of the following?
A) viruses
B) zombies
C) macros
D) cyborgs
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q18: The acronym IDS stands for which of
Q19: Which type of attack cripples the network
Q20: Explain the advantages of application whitelisting?
Q21: Which type of security is specifically concerned
Q22: What type of malicious procedure involves using
Q24: Whitelisting allows only approved programs to run
Q25: Match each item with a statement below.<br>-A
Q26: What is spyware and how does it
Q27: Match each item with a statement below.<br>-Attackers
Q28: What is a DDoS attack?