Match the following terms with their description.
A. | Enables someone to gain control over a computer |
B. | Uses a pattern matching technique |
C. | A network of computer zombies controlled by a master |
D. | Used to cripple a server or network |
E. | Malicious program masked as a legitimate program |