An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?
Broderick
5 months agoMarcos
6 months agoCarlota
6 months agoGracia
6 months agoCaprice
6 months agoTiffiny
6 months agoDeonna
6 months agoOdette
6 months agoVernice
6 months agoMary
6 months agoOllie
6 months agoGeraldine
6 months agoLavonna
6 months agoEmelda
6 months agoRodney
6 months ago