____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.

A. Drones
B. Helpers
C. Zombies
D. Servants


Answer: C

Computer Science & Information Technology

You might also like to view...

Efficient Web page creators reuse objects by copying, pasting, and modifying them as needed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A ____ is the repetition of a block of instructions.

A. cycle B. nucleus C. matrix D. loop

Computer Science & Information Technology

Which type of memory module has RAM chips on both sides?

A. OUM B. DIMM C. M-RAM D. SIMM

Computer Science & Information Technology

Which of the following statements about passing arrays to a function is false?

A. The function must be called passing only the name of the array. B. In the function definition, the formal parameter must be an array type. C. The size of a fixed-length array does not need to be specified. D. The size of a variable-length array in the function prototype must be an asterisk or a variable. E. The size of a variable-length array in a function definition must be a variable in the function body.

Computer Science & Information Technology