A computer or network that is compromised and used as a launch point for malicious attacks against other systems is referred to as a _______.
- Botnet
- Honey Pot
- Proxy Server
- Zero-Day Vulnerability
A 'Proxy Server' is a computer or network device that can be compromised and used to route malicious traffic, making it appear as if the attacks are originating from a different source.
Loading...
Related Quiz
- When changes are proposed during a project, they're typically reviewed and either approved or denied by a group known as the _______.
- An essential consideration for IoT security is ensuring the _______ of data as it is transferred from devices to servers.
- In NLP, what is the process of converting words into numerical vectors called?
- For HPC applications that require vast amounts of data processing in real-time, which memory characteristic is crucial?
- A _______ is a virtualized storage model that pools physical storage from multiple network storage devices and makes it appear as if it's a single storage device.