Which three describe what happens when a compromised system that is used for malware operation is discovered and taken down? (Choose three.)
A. The malware downloader may be unable to retrieve its payload.
B. The malware may attempt to use a different compromised system to download malicious payload.
C. Malware communication with the CnC server may stop.
D. The malware may inform the CnC center that a compromised system has been discovered and the entire operation should be aborted.