EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 107
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: C
Zombie is system compromised by a hacker, virus, or trojan and is now being controlled remotely used.
Other Names for a Zombie:
Bot (short for robot): Especially when referring to it as part of a botnet
Drone: Emphasizing its mindless obedience to commands
Puppet: Controlled remotely by a puppet master (the attacker)
Compromised host/system

Opted Answer: C
Idle system refers toa a system that is not being used or is in an inactive state