A computer that a hacker has gained control of in order to launch DoS attacks is known as a __________ computer.
a. compromised
b. breached
c. rootkit
d. zombie