A computer system is no more secure than the human systems responsible for its operation.
Malicious individuals have regularly penetrated well-designed, secure computer systems by taking
advantage of the carelessness of trusted individuals, or by deliberately deceiving them.
zombie computers are being HEAVILY relied upon on by which of the following types of attack?
None of the choices.
“Distributed denial of service (DDoS) attacks are common, where a large number of compromised
hosts (“”zombie computers””) are used to flood a target system with network requests, thus
attempting to render it unusable through resource exhaustion.”