In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?

A. centered
B. local
C. remote
D. distributed

Answer: D

Computer Science & Information Technology

You might also like to view...

Life span refers to how long information is reliable.

a. true b. false

Computer Science & Information Technology

Which type of network traffic is used for vSphere High Availability(HA) by default?

a. Management network traffic b. iSCSI Port Binding network traffic c. vMotion network traffic d. VM Network traffic

Computer Science & Information Technology