In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as:

In order to coordinate the activity of many infected computers, attackers have used coordinating
systems known as:

In order to coordinate the activity of many infected computers, attackers have used coordinating
systems known as:

A.
wormnets

B.
trojannets

C.
spynets

D.
botnets

E.
rootnets

F.
backdoor

Explanation:

In order to coordinate the activity of many infected computers, attackers ave used coordinating
systems known as botnets. In a botnet, the malware or malbot logs in to an Internet Relay Chat
channel or other chat system. The attacker can then give instructions to all the infected systems
simultaneously.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

seven − five =