Which of the following is a network of compromised devices used to perform malicious activities?

Which of the following is a network of compromised devices used to perform malicious activities?
A . Man in the Middle
B . Traffic interception
C . DoS
D . Botnet

Answer: D

Latest 020-100 Dumps Valid Version with 230 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments