There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system. In this type of malicious code attack, a user launches a non- replicating malware program:

a. Trojan Horse
b. Virus
c. Worm
d. Logic Bomb


a. Trojan Horse

Criminal Justice

You might also like to view...

True or False: One major advantage of the NTFS over the File Allocation Table is that Organizational data under NTFS is scattered widely over the drive and is therefore less prone to failure unlike FAT which is all stored in one place on the drive

a. True b. False

Criminal Justice

Prisonization is best described as:

A. the means whereby prisoners adopt the subculture of the institution. B. the general trend of increasing incarceration rates in a given population. C. the bleeding of prison culture into popular culture. D. the manner in which prisoners’ self-perceptions change due to prison violence.

Criminal Justice

Some cyber criminals are motivated less by profit and more by the urge to commit _______, or technological destruction

Fill in the blank(s) with correct word

Criminal Justice

List and briefly describe the three branches of social process theory

What will be an ideal response?

Criminal Justice