Question

________ are compromised hosts running malware controlled by the hacker.
A) DDoS
B) ICMP
C) Bots
D) None of the above

Answer

This answer is hidden. It contains 1 characters.