Sara, an employee, visits a website and downloads the PDF application to officially become a member. The network administrator notices large amounts of bandwidth at night from Sara's workstation. Which of the following attacks does this describe?
A. Adware
B. Botnets
C. Logic bomb
D. Spyware
Answer: B. Botnets
Computer Science & Information Technology
You might also like to view...
The purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Windows 10 can display only one other clock(s) besides the default clock.??
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Before deleting a vertex, we must make sure that ____.
A. it is disjoint B. it is not the root C. it is not directly pointed by the head D. has no more than one neighbor
Computer Science & Information Technology
Describe an unintentional DoS attack.
What will be an ideal response?
Computer Science & Information Technology