Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
A. botnet
B. Trojan
C. logic bomb
D. packet monkey
Answer: A
You might also like to view...
The first step in formally managing a project of any size is to define the project ____.
A. scope B. goal C. parameters D. hierarchy
With which of the following does the computer process each transaction as it is entered?
A. OLTP B. OTPL C. OTLP D. OLPT
? Which of the following list styles should be applied to the ol element to display an unordered list with markers as shown below? HomeGetting StartedScrapbooking TipsSupply List
A. ?ul {list-style-type: none;} B. ?ul {list-style-type: upper-greek;} C. ?ul {list-style-type: circle;} D. ?ul {list-style-type: disc;}
It is possible that the graphic in the figure above was created with the Ellipse tool.
Answer the following statement true (T) or false (F)