1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
5

A piece of malicious code uses dictionary attacks against computers to gain access to administrative accounts. The code then lin

ks compromised computers together for the purpose of receiving remote commands. What term best applies
to this malicious code?
A. Exploit
B. Botnet
C. Logic bomb
D. Backdoor
Computers and Technology
1 answer:
stira [4]3 years ago
8 0

Answer:

B) Botnet

Explanation:

A botnet  applies to  a number of Internet-connected devices (computers), they are majorly used to perform distributed denial-of-service attack, steal data, send spam, and allows the attacker to access the devices and computers and its connection. the scenario described in the questions describes a typical BOTNET.

You might be interested in
¿Qué creo que debe considerar una empresa para elegir ellugar en el cual va a desarrollar su actividad económica osu emprendimie
zhannawk [14.2K]

Answer:

sorry I don't speak that language

8 0
3 years ago
which computer career field enables you to create and design interactive multimedia products and services
dusya [7]
I think its graphic design 
4 0
3 years ago
Rosa is a high school freshman with no savings. She wants to buy a new smartphone in a few months for $300. Which account type b
Iteru [2.4K]
Simple savings account
6 0
3 years ago
Read 2 more answers
Give five examples of top level domain​
coldgirl [10]

Answer:  .com — Commercial businesses.

.org — Organizations (generally charitable).

.net — Network organizations.

.gov — U.S. government agencies.

.mil — Military.

.edu — Educational facilities, like universities.

Explanation:

5 0
3 years ago
Read 2 more answers
Which of the following software is an
krok68 [10]
The answer is B:McAfee
3 0
3 years ago
Read 2 more answers
Other questions:
  • How many inputs are included in the following requirement? REQUIREMENT: Write a program that asks the employee for their age. Th
    6·1 answer
  • Fair use allows individuals to break copyright so long as they ________.
    15·1 answer
  • A study guide can be created
    6·2 answers
  • To add color to the entire background of a page, users will select the ___ feature?
    14·1 answer
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • Match the job description to the level of degree it requires.
    15·1 answer
  • Edhisive 3.5 code practice
    9·1 answer
  • Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journal
    8·1 answer
  • Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numb
    13·1 answer
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!