DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.
(a) worms
(b) virus
(c) botnets
(d) programs
This question was addressed to me during an interview.
This question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security