The type of security threat that uses computers or other networks to accept and pass on viruses is called:
A.
phishing.
B.
botnets.
C.
logic bomb.
D.
man-in-the-middle.
The type of security threat that uses computers or other networks to accept and pass on viruses is called:
The type of security threat that uses computers or other networks to accept and pass on viruses is called:
A.
phishing.
B.
botnets.
C.
logic bomb.
D.
man-in-the-middle.
A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things devices that are infected and controlled by a common type of malware. Users are often unaware of a botnet infecting their system.
Infected devices are controlled remotely by threat actors, often cybercriminals, and are used for specific functions, so the malicious operations stay hidden to the user. Botnets are commonly used to send email spam, engage in click fraud campaigns and generate malicious traffic for distributed denial-of-service attacks.