An attack that has a master host, a zombie, and multiple middle devices running zombie programs is called a __________.
Which of the following is a field of study that focuses on ways of understandingand analyzing data in databases, with concentration on automation advancements?