EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: C
Zombie is system compromised by a hacker, virus, or trojan and is now being controlled remotely used.
Other Names for a Zombie:
Bot (short for robot): Especially when referring to it as part of a botnet
Drone: Emphasizing its mindless obedience to commands
Puppet: Controlled remotely by a puppet master (the attacker)
Compromised host/system

Opted Answer: C
Idle system refers toa a system that is not being used or is in an inactive state