?Typical functions for a Trojan might include ____, taking screen captures, accessing files on local and shared drives, or acting as a server where the client is the hacker.

A. ?detecting a virus
B. ?logging keystrokes
C. ?deleting other Trojan horses
D. ?detecting worms


Answer: B

Computer Science & Information Technology

You might also like to view...

What is a WAN?

What will be an ideal response?

Computer Science & Information Technology

Friendly/Unintentional DOS is typically caused by heavy legitimate traffic to a server or a website that inadvertently overwhelms the server resources or the network connection. So, the server or the network is not able to handle the massive volume of traffic. The users will likely experience which of the following?

What will be an ideal response?

Computer Science & Information Technology

Beta copies of software are often distributed to software testers

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is not a markup view?

A) Simple Markup B) All Markup C) Pending Markups D) Original

Computer Science & Information Technology