153k views
5 votes
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.

2 Answers

2 votes

Answer:

The options for this question are the following:

A) Drones

B) Helpers

C) Zombies

D) Servants

The correct answer is C) Zombies

Step-by-step explanation:

In computing, a zombie is a computer connected to the network that has been compromised by a hacker, a computer virus or a Trojan. It can be used to perform various malicious tasks remotely.

Most zombie computer owners are not aware that their system is being used in this way, hence the comparison with the walking dead. In addition, they are used in DDoS attacks coordinated with multiple botnet machines that resemble zombie horde attacks, such as those that appear in horror movies.

User Rayryeng
by
8.7k points
3 votes

Answer: Zombies

Step-by-step explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

User Boston
by
8.0k points