1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan horse2. Select the correct order for the different phases of virus execution.i) Propagation phase ii) Dormant phaseiii) Execution phase iv) Triggering phaseA) i, ii, iii, and ivB) i, iii, ii...[ أكمل القراءه ]