Answer the following statements true (T) or false (F)

1. A Trojan horse is an apparently useful program containing hidden code that, when invoked, performs some harmful function.
2. Packet sniffers are mostly used to retrieve sensitive information like usernames and passwords.
3. A bot propagates itself and activates itself, whereas a worm is initially controlled from some central facility.
4. Every bot has a distinct IP address.
5. DDoS attacks make computer systems inaccessible by flooding servers with useless traffic so that legitimate users can no longer gain access to those resources.


1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. TRUE

Computer Science & Information Technology

You might also like to view...

What is the general form of the for each in array statement?

A. for (n < item : array++ ) {    Statements } B. for (item < n++ : array ) {    Statements } C. for (Type array : item ) {    Statements } D. for (Type item : array ) {    Statements }

Computer Science & Information Technology

Hand trace the ticket counter problem for 22 customers and 4 cashiers. Graph the total process time for each person. What can you surmise from these results?

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements regarding filters and transitions is false?

a) They are built into Internet Explorer. b) They are applied on a client computer at run time by the server. c) They enable portions of pages and entire pages to be faded in an out. d) They enable 3-d effects.

Computer Science & Information Technology

The pseudocode keyword for getting input from a user is ____, followed by the variable that's receiving the value.

A. Display B. Input C. prompt() D. Print

Computer Science & Information Technology