What would this contaminated computer be part of?

Posted by: Pdfprep Category: ACA-Sec1 Tags: , ,

You configure a computer to act as a zombie set in order to attack a web server on a specific date.

What would this contaminated computer be part of?
A . The computer is part of a DDoS attack
B . The computer is part of a TCP/IP hijacking
C . The computer is part of a spoofing attack
D . The computer is part of a man-in-the-middle attack

Answer: A

Leave a Reply

Your email address will not be published.