____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
A. Drones
B. Helpers
C. Zombies
D. Servants
Answer: C
Computer Science & Information Technology
You might also like to view...
The ________ function calculates the monthly payment for a new loan
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following items changes the encryption key on a users session after a set period of time?
A. TKIP B. AES C. RADIUS D. WEP
Computer Science & Information Technology