A computer that a hacker has gained control of in order to launch DoS attacks is known as a computer
a. rootkit
b. compromised
c. zombie
d. breached
C
You might also like to view...
To allow the user the maximum number of color options, set the ________ property of a ColorDialog to ________.
a) Full, true b) SimpleColor, false c) FullOpen, true d) FullDialog, true e) ShowAll, true
When using Windows 8, ________ is the app that is used to create and manage files and folders
A) File Manager B) Windows Explorer C) Folder Manager D) File Explorer
Critical Thinking ? Case 6-2 ? Over the Spring Break, you decide to clean up the files on your computer to make sorting and searching faster. You cannot remember the best methods to accomplish this task, so you consult a friend. ?Your friend also reminds you that the index will not perform well if
A. ?it grows too large. B. ?it is too small. C. ?it contains program and system files. D. ?it is searching an SSD.
Which of the following members of a project steering team removes barriers to the project success?
a. A project sponsor b. A subject matter expert c. A project champion d. A technical resource