Computers that are controlled by outsiders without the owner's knowledge are called _______ .

A. zombies
B. bots
C. botnets
D. evil twins


Answer: A

Computer Science & Information Technology

You might also like to view...

Give an example of a schedule produced by a read-only multiversion concurrency control in which the read/write transactions serialize in commit order while the read-only transactions serialize in a different order.

What will be an ideal response?

Computer Science & Information Technology

Which of the following will a well designed and thought-out forensic facility ensure for each new piece of technology that is brought in?

a. It is court approved. b. It undergoes significant testing. c. It goes through a fair bidding process. d. It is recorded in a well-document change control statement.

Computer Science & Information Technology

How many characters can be stored in a field with a Long Text data type?

A) 12,256 B) 64,000 C) Unlimited D) 1,000

Computer Science & Information Technology

Which of the following protocols runs on port 22 and protects the authenticity and confidentiality of file transfer data in transit?

a. SCP b. DHCP c. FTP d. SSL

Computer Science & Information Technology