?Typical functions for a Trojan might include ____, taking screen captures, accessing files on local and shared drives, or acting as a server where the client is the hacker.
A. ?detecting a virus
B. ?logging keystrokes
C. ?deleting other Trojan horses
D. ?detecting worms
Answer: B
Computer Science & Information Technology
You might also like to view...
What is a WAN?
What will be an ideal response?
Computer Science & Information Technology
Friendly/Unintentional DOS is typically caused by heavy legitimate traffic to a server or a website that inadvertently overwhelms the server resources or the network connection. So, the server or the network is not able to handle the massive volume of traffic. The users will likely experience which of the following?
What will be an ideal response?
Computer Science & Information Technology
Beta copies of software are often distributed to software testers
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is not a markup view?
A) Simple Markup B) All Markup C) Pending Markups D) Original
Computer Science & Information Technology