An infected robot computer is known as a ____.
A. zombie
B. Trojan horse
C. beachhead
D. bottle
Answer: A
Computer Science & Information Technology
You might also like to view...
What is the primary protocol that is used to mitigate Layer 2 loops?
A) CDP B) LACP C) STP D) Ethernet
Computer Science & Information Technology
A __ is a program that can replicate by attaching itself to another program.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology