Choose the components a threat actor may use to set up a distributed denial of service attack (DDoS) on a local network. (Select all that apply.)

A. Remote access trojan
B. Spyware
C. Command and control
D. Botnet