In order to coordinate the activity of many infected computers, attackers have used coordinating systems
known as:
A.
wormnets
B.
trojannets
C.
spynets
D.
botnets
E.
rootnets
F.
backdoor
Explanation:
In order to coordinate the activity of many infected computers, attackers ave used coordinating systems known
as botnets. In a botnet, the malware or malbot logs in to an Internet Relay Chat channel or other chat system.
The attacker can then give instructions to all the infected systems simultaneously.