Which of the following viruses pretends to be a normal application?
A) Boot sector
B) Trojan horse
C) Worm
D) Stealth
Answer: B) Trojan horse
You might also like to view...
An array is a very good data structure for storing a sequence whose size does not change.
Answer the following statement true (T) or false (F)
Which of the following is an operating system?
a) UNIX b) Microsoft Word c) Assembly Language d) C++
Ben receives an e-mail purporting to be from his bank, advising him that new passwords are being distributed. The e-mail asks him to enter his current password, as well as other personal information. Ben sends the requested information and then notices the next day that funds have been withdrawn from his account without his knowledge or consent. Upon contacting the bank, Ben learns that the original e-mail was a fraud. Ben is a victim of ________. electronic monitoring
Which of the following is NOT a security concern presented by virtualized storage?
A. The additional layers of technology required by virtual storage increases management overhead by necessitating additional points at which to apply security controls. B. There are challenges involved in managing large numbers of virtual instances and snapshots. C. There is a potential loss of visibility into the guest operating systems and the network traffic in the virtualized environment. D. There is an inability to control access through authentication.