Place the following steps of a botnet attack into correct order

I. First A. A spammer (or criminal) buys access to the botnet from the botmaster
II. Second B. The botmaster or spammer sends instructions to the infected PCs using
the IRC server, which triggers them to send out spam messages to
other servers
III. Third C. A botmaster sends out viruses to infect computers
IV. Fourth D. Infected PCs follow instructions to log in to an IRC server


C D A B

Computer Science & Information Technology

You might also like to view...

The technical term for ____ is digital audio extraction.

A. ripping B. tearing C. packing D. processing

Computer Science & Information Technology

There are two primary types of procedures which are supported by Visual Basic: a Sub procedure and a ________ procedure

A) Virtual B) Prime C) Function D) Base

Computer Science & Information Technology

AC Case 2-1Darius is organizing his five-year high school reunion. He is creating an Access table to organize the classmate information, email list, and event reservations. Darius wants to delete the field for home phone when he realized that only a few people provided that information. After right-clicking the field name in ____, he will click Delete Field on the shortcut menu.

A. Design View B. Form View C. Datasheet View D. PivotTable View

Computer Science & Information Technology

In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

a. Non-return-to-zero (NRZ) level. b. NRZ mark. c. NRZ space. d. Return-to-zero.

Computer Science & Information Technology