Question

In: Computer Science

What is the name for a device infected with malware that an attacker uses to control...

What is the name for a device infected with malware that an attacker uses to control the device remotely?

Solutions

Expert Solution

The correct answer is a zombie.

Explanation :

The computer hacker uses a device that is compromised by a hacker to attack the network or run the malicious code on the network. That device is called a zombie.

An attacker targets the device which is vulnerable to get hacked by the attacker to run the malicious software like a virus, infected programs, spyware or adware software.

Once the attacker takes control of the infected device, then he can control the whole network with the help of zombie host using standard internet protocols like Http or internet relay chat programs.


Related Solutions

A project manager that uses milestones as a project control device is using a: Predictive control...
A project manager that uses milestones as a project control device is using a: Predictive control system. Feedback control system. Proactive control system. Reactive control system.
What are the names of A&B? what is this device? what is the name of (a /b/c/d) parts of this device
What are the names of A&B what is this device? what is the name of (a /b/c/d) parts of this device
What are device control threats? and a few examples.
What are device control threats? and a few examples.
What name is given to the device that drives a generator?
What name is given to the device that drives a generator?
Company manufactures a mobile fitness device called the Jogging Mate. The company uses standards to control...
Company manufactures a mobile fitness device called the Jogging Mate. The company uses standards to control its costs. The labor standards that have been set for one Jogging Mate are as follows: Standard Hours Standard Rate per Hour Standard Cost 27 minutes $5.80 $2.61 During August, 9,550 hours of direct labor time were needed to make 19,800 units of the Jogging Mate. The direct labor cost totaled $53,480 for the month. Required: 1. What is the standard labor-hours allowed (SH)...
Research a virus or malware that spreads via the network once it has infected a computer. Items to note are the following:
Research a virus or malware that spreads via the network once it has infected a computer. Items to note are the following:Name of the infection?How does it infect the original host?Is their a fix for the infection, ie Critical Security Update?What process does it hijack on the computerHow does it spread from the original host?What damage can it do over the network?How can an administrator stop the spread of the infection?
What is the name for the glass measuring device used for sodium hydroxide?
What is the name for the glass measuring device used for sodium hydroxide?
name 5 colors of wire that go to a thermostat and name what they control
name 5 colors of wire that go to a thermostat and name what they control
1)What is the LDR sensor and what is the effect of light on this device? 2)Name...
1)What is the LDR sensor and what is the effect of light on this device? 2)Name 4 physical phenomena that light can have on some devices, so these devices can be used as light sensor. 3)What is the main difference in structure of PIN Photodiode and standard PN photodiode (photovoltaic cell)? What is the advantage of PIN over PN?
what is a Bubble Humidifier?. Which patient uses this device and what is the Literflow and...
what is a Bubble Humidifier?. Which patient uses this device and what is the Literflow and FiO2 for this therapy?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT