Damage from a bot attack can take place after the bot compromises a machine. Which of the following represents the order by which this process takes place?
The bot:
A. infects a machine, communicates with its command and control handlers, and penetrates the organization.
B. penetrates the organization, infects a machine, and communicates with its command and control handlers.
C. communicates with its command and control handlers, infects a machine, and penetrates the organization.
D. penetrates the organization, communicates with its command and control handlers, and infects a machine.