We've detected that Javascript is not enabled. It is required for an optimal survey taking experience. Please check your browser's settings and make sure Javascript is turned on. Learn how to enable Javascript.
4. A hacker doesn't want to use a computer that can be tracked back to them. They decide to use a zombie computer. Which type of scan BEST describes what the hacker is doing?