In what type of attack are zombies usually put to use?

A. buffer overrun
B. virus
C. DDoS
D. spoofing


Answer: C

Computer Science & Information Technology

You might also like to view...

Which sort algorithm does the following outline define?

for i between 0 and number_used-1 inclusive put the ith smallest element at array[i] a. sequential b. selection c. bubble d. swap

Computer Science & Information Technology

List all copies of book titles that are available for borrowing.

What will be an ideal response?

Computer Science & Information Technology

Why would you enable the AMD-V option in a computer's BIOS?

A. to allow fault tolerance B. to use hardware virtualization C. for dynamic IP configurations D. for private cloud implementation

Computer Science & Information Technology

In order to use the Adobe Content Viewer, you must have an Adobe account.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology