You configure a computer to act as a zombie set in order to attack a web server on a specific date.
What would this contaminated computer be part of?
The computer is part of a DDoS attack
The computer is part of a TCP/IP hijacking
The computer is part of a spoofing attack
The computer is part of a man-in-the-middle attack
Submit