Compromised computers attached to the Internet, which are often used to remotely perform malicious or criminal tasks, are called ________

Fill in the blank(s) with the appropriate word(s).

Answer: zombies/bots

Computer Science & Information Technology

You might also like to view...

Erratic movement of the ________ could be a sign of dirty XY rollers

Fill in the blank(s) with correct word

Computer Science & Information Technology

The _________ payload allows peers to identify packet flows for processing by IPsec services.

A) Configuration B) Vendor ID C) Traffic Selector D) Extensible Authentication Protocol

Computer Science & Information Technology