Site icon Exam4Training

Which of the following is a network of compromised devices used to perform malicious activities?

Which of the following is a network of compromised devices used to perform malicious activities?
A . Man in the Middle
B . Traffic interception
C . DoS
D . Botnet

Answer: D

Latest 020-100 Dumps Valid Version with 230 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version