Suppose that one day you get an e-mail from one of your friends suggesting you download and install a new game he found online. You download, install, and play the game. Without your knowledge, the game forwards a recommendation to download and install the game to all of your e-mail contacts. Without any outward sign, each instance of the game is part of a malicious attempt to flood a government website so that it crashes. In this scenario, your computer plays the role of a(n)

zombie.

attacker.

victim.

handler.

Respuesta :

attacker


.....................
In this situation, your computer would be playing the role of the handler and the game would be the attacker.