A botmaster uses Malware to hijack thousands of computers and control them remotely; the controlled computers are called_____

A. robots
B. zombies
C. worms
D. Trojan horses


Ans: B. zombies

Computer Science & Information Technology

You might also like to view...

A(n) ________ control displays the data found in a field in a form's record source

Fill in the blank(s) with correct word

Computer Science & Information Technology

Click Publishing on the ____ menu to switch to Publishing View.

A. View B. Site C. Publish D. Tools

Computer Science & Information Technology

Which type of webpages will automatically adjust the size of the content to display appropriately relative to the size of the screen of the device on which it is displayed??

A. ?automatic B. ?responsive C. ?adjustable D. relative

Computer Science & Information Technology

Match each item with an statement below:

A. originally used to reduce the amount of traffic on a network. B. software security updates that vendors provide for their application programs and operating systems. C. area in which a broadcast occurs. D. establishes what action the firewall should take when it receives a packet. E. set of software tools used by an attacker to break into a computer and obtain special operating system privileges. F. allows the user to restore specific browser settings if spyware infects the Web browser. G. usually located outside the network security perimeter as the first line of defense. H. the best defense against viruses. I. helps prevent computers from becoming infected by different types of spyware.

Computer Science & Information Technology