Multiple Choice
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
A) Drones
B) Helpers
C) Zombies
D) Servants
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q16: A computer virus consists of segments of
Q43: The shoulder looking technique is used in
Q45: One form of online vandalism is _
Q48: The _ hijacking attack uses IP spoofing to
Q49: Forces of nature,force majeure,or acts of God
Q51: Information security's primary mission is to ensure
Q52: A(n)_ is an application error that occurs
Q63: The _ data file contains the hashed representation
Q68: Attacks conducted by scripts are usually unpredictable.
Q77: In the context of information security, _