In: Computer Science
What is the name for a device infected with malware that an attacker uses to control the device remotely?
The correct answer is a zombie.
Explanation :
The computer hacker uses a device that is compromised by a hacker to attack the network or run the malicious code on the network. That device is called a zombie.
An attacker targets the device which is vulnerable to get hacked by the attacker to run the malicious software like a virus, infected programs, spyware or adware software.
Once the attacker takes control of the infected device, then he can control the whole network with the help of zombie host using standard internet protocols like Http or internet relay chat programs.