_____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.
(a) Trojan
(b) Virus
(c) Botnet
(d) Worms
This question was posed to me in an online interview.
I need to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security