ISACA Exam Questions

In order to coordinate the activity of many infected computers, attackers have used coordinating sys

In order to coordinate the activity of many infected computers, attackers have used coordinating
systems known as:

A.
wormnets

B.
trojannets

C.
spynets

D.
botnets

E.
rootnets

F.
backdoor

Explanation:

In order to coordinate the activity of many infected computers, attackers ave used coordinating
systems known as botnets. In a botnet, the malware or malbot logs in to an Internet Relay Chat
channel or other chat system. The attacker can then give instructions to all the infected systems
simultaneously.