Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

A. backdoor
B. shell
C. worm
D. macro virus


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is not an argument of the assign member function?

a. The start location. b. The number of characters to copy. c. The end location. d. The string to copy.

Computer Science & Information Technology

Which key is used to step over a function?

A. F5 B. F10 C. F11 D. Ctrl-F10

Computer Science & Information Technology

For shell sort, it has been suggested that we should not start with an increment greater than ____ of the list size.

A. one third B. one half C. two thirds D. three fourths

Computer Science & Information Technology

OLE DB relies on connection strings that enable the application to access the data stored on an external device.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology