Posted by: Pdfprep
Post Date: February 10, 2021
You configure a computer to act as a zombie set in order to attack a web server on a specific date.
What would this contaminated computer be part of?
A . The computer is part of a DDoS attack
B . The computer is part of a TCP/IP hijacking
C . The computer is part of a spoofing attack
D . The computer is part of a man-in-the-middle attack
Answer: A
Leave a Reply