The attacker using a network of compromised devices is known as _____________
(a) Internet
(b) Botnet
(c) Telnet
(d) D-net
I have been asked this question during an internship interview.
My question is taken from Network Attacks topic in division Security & Physical Layer of Computer Network