159k views
1 vote
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a ___.

A. Botnet
B. Zombie
C. Compromised host
D. Malware-infected system

User Ymajoros
by
8.4k points

1 Answer

5 votes

Final answer:

A compromised computer controlled by a hacker is specifically referred to as a Zombie, which may be part of a botnet and infected with various types of malware.

Step-by-step explanation:

A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a Zombie. When a computer is compromised in such a way, it can be controlled remotely without the owner's knowledge, often to send spam emails, engage in click fraud, or participate in a distributed denial-of-service (DDoS) attack as part of a larger network of compromised computers, known as a botnet. A compromised host may contain various types of malware, but the term that specifically refers to an individual computer under the control of a hacker is 'Zombie.'

User Chengmin
by
8.8k points