COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Group of compromised computers or mobile devices connected to a network, such as the Internet, that is used to attack other networks, usually for nefarious purposes
A
Backdoor
B
Botnet
C
Firewall
D
Spoofing
Explanation: 

Detailed explanation-1: -In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker.

Detailed explanation-2: -A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.” Each individual machine under the control of the bot-herder is known as a bot.

There is 1 question to complete.