InterviewSolution
Saved Bookmarks
| 1. |
_____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.(a) Trojan(b) Virus(c) Botnet(d) WormsThis question was posed to me in an online interview.I need to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right CHOICE is (c) Botnet |
|