Damage from a bot attack can take place after the bot compromises a machine. Which of the following
represents the order by which this process takes place? The bot:
A.
infects a machine, communicates with its command and control handlers, and penetrates the
organization.
B.
penetrates the organization, infects a machine, and communicates with its command and control
handlers.
C.
communicates with its command and control handlers, infects a machine, and penetrates the
organization.
D.
penetrates the organization, communicates with its command and control handlers, and infects a
machine.