____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.

A. Drones
B. Helpers
C. Zombies
D. Servants

Answer: C

Computer Science & Information Technology

You might also like to view...

The ________ function calculates the monthly payment for a new loan

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following items changes the encryption key on a users session after a set period of time?

A. TKIP B. AES C. RADIUS D. WEP

Computer Science & Information Technology