In what type of attack are zombies usually put to use?

A. buffer overrun
B. virus
C. DDoS
D. spoofing

Answer: C

Computer Science & Information Technology

You might also like to view...

If aPtr and bPtr point to consecutive nodes in a linked list, write the code that deletes the node pointed to by bPtr.

What will be an ideal response?

Computer Science & Information Technology

This is usually associated with an increase in data speeds where a cable is not designed to support the higher data rate.

What will be an ideal response?

Computer Science & Information Technology