In what type of attack are zombies usually put to use?
A. buffer overrun
B. virus
C. DDoS
D. spoofing
Answer: C
Computer Science & Information Technology
You might also like to view...
If aPtr and bPtr point to consecutive nodes in a linked list, write the code that deletes the node pointed to by bPtr.
What will be an ideal response?
Computer Science & Information Technology
This is usually associated with an increase in data speeds where a cable is not designed to support the higher data rate.
What will be an ideal response?
Computer Science & Information Technology