Which of the following refers to a computer used in a DDoS attack?

A) Botnet
B) Victim
C) Bot
D) Handler


C) Bot

Computer Science & Information Technology

You might also like to view...

In a(n) ________ system, each step is dependent on the previous step

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ________ displays if you point to a folder that contains a subfolder

A) green arrow B) plus sign C) triangle D) red minus sign

Computer Science & Information Technology

In a hanging indent, the first line of each paragraph is set off from the left margin

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is the practice of sharing computing resources, such as servers, like those in the accompanying figure?

A. clustering B. concatenation C. aggregation D. virtualization

Computer Science & Information Technology