In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?
A. centered
B. local
C. remote
D. distributed
Answer: D
Computer Science & Information Technology
You might also like to view...
Life span refers to how long information is reliable.
a. true b. false
Computer Science & Information Technology
Which type of network traffic is used for vSphere High Availability(HA) by default?
a. Management network traffic b. iSCSI Port Binding network traffic c. vMotion network traffic d. VM Network traffic
Computer Science & Information Technology