A computer that a hacker has gained control of in order to launch DoS attacks is known as a computer

a. rootkit
b. compromised
c. zombie
d. breached


C

Computer Science & Information Technology

You might also like to view...

To allow the user the maximum number of color options, set the ________ property of a ColorDialog to ________.

a) Full, true b) SimpleColor, false c) FullOpen, true d) FullDialog, true e) ShowAll, true

Computer Science & Information Technology

When using Windows 8, ________ is the app that is used to create and manage files and folders

A) File Manager B) Windows Explorer C) Folder Manager D) File Explorer

Computer Science & Information Technology

Critical Thinking ? Case 6-2 ? Over the Spring Break, you decide to clean up the files on your computer to make sorting and searching faster.  You cannot remember the best methods to accomplish this task, so you consult a friend. ?Your friend also reminds you that the index will not perform well if

A. ?it grows too large. B. ?it is too small. C. ?it contains program and system files. D. ?it is searching an SSD.

Computer Science & Information Technology

Which of the following members of a project steering team removes barriers to the project success?

a. A project sponsor b. A subject matter expert c. A project champion d. A technical resource

Computer Science & Information Technology