Which of the following refers to a computer used in a DDoS attack?
A) Botnet
B) Victim
C) Bot
D) Handler
C) Bot
Computer Science & Information Technology
You might also like to view...
In a(n) ________ system, each step is dependent on the previous step
Fill in the blank(s) with correct word
Computer Science & Information Technology
A ________ displays if you point to a folder that contains a subfolder
A) green arrow B) plus sign C) triangle D) red minus sign
Computer Science & Information Technology
In a hanging indent, the first line of each paragraph is set off from the left margin
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is the practice of sharing computing resources, such as servers, like those in the accompanying figure?
A. clustering B. concatenation C. aggregation D. virtualization
Computer Science & Information Technology