PdfPrep.com

What would this contaminated computer be part of?

You configure a computer to act as a zombie set in order to attack a web server on a specific date.

What would this contaminated computer be part of?
A . The computer is part of a DDoS attack
B . The computer is part of a TCP/IP hijacking
C . The computer is part of a spoofing attack
D . The computer is part of a man-in-the-middle attack

Answer: A

Exit mobile version