Sara, an employee, visits a website and downloads the PDF application to officially become a member. The network administrator notices large amounts of bandwidth at night from Sara's workstation. Which of the following attacks does this describe?

A. Adware
B. Botnets
C. Logic bomb
D. Spyware


Answer: B. Botnets

Computer Science & Information Technology

You might also like to view...

The purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Windows 10 can display only one other clock(s) besides the default clock.??

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Before deleting a vertex, we must make sure that ____.

A. it is disjoint B. it is not the root C. it is not directly pointed by the head D. has no more than one neighbor

Computer Science & Information Technology

Describe an unintentional DoS attack.

What will be an ideal response?

Computer Science & Information Technology