What is a computer that is controlled by a master, and used to launch various types of attacks?

A. bot
B. bug
C. cluster


A. bot

Computer Science & Information Technology

You might also like to view...

Translate the following hexadecimal into binary and then into ASCII. 68 65 78 61 64 65 63 69 6D 61 6C

What will be an ideal response?

Computer Science & Information Technology

Which function call is correct for the function named PassThis which passes the Table array?

A. PassThis(Table); B. void PassThis(Table); C. PassThis(Table[4][3]); D. None of the above.

Computer Science & Information Technology

Which of the following is a Cisco proprietary first-hop redundancy protocol?

A) HSRP B) CARP C) LACP D) Cisco-RP

Computer Science & Information Technology

Which of the following results from poorly configured technologies that a Web application runs on top of?

A. reflected corruption B. stored misconfigurations C. reflected misconfigurations D. security misconfigurations

Computer Science & Information Technology