Once a _____ is installed, the attacker can gain full access to the computer.

A. ?botnet
B. zombie
C. ?worm 
D. ?rootkit


Answer: A

Computer Science & Information Technology

You might also like to view...

The ________ paste option removes all formatting from the selection

Fill in the blank(s) with correct word

Computer Science & Information Technology

MTBF describes the average amount of time it takes to get a device fixed and back online

Indicate whether the statement is true or false.

Computer Science & Information Technology

The ____________ web provides the foundation to create flexible navigation for the end user.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Public-key encryption was developed in the late ________.

A. 1950s B. 1970s C. 1960s D. 1980s

Computer Science & Information Technology