Trojans can perform which of the following actions?

a. Delete files on the computer.
b. Launch a DoS attach.
c. Open a backdoor.
d. All the above.


ANS: C

Computer Science & Information Technology

You might also like to view...

What is the role and goal of neutrality during a test?

What will be an ideal response?

Computer Science & Information Technology

The three traversal algorithms we mentioned in the text for binary search trees are ________ , _______ and _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Usually, jQuery Mobile sites include ____ page div(s) for every page in the site.

A. one B. two C. three D. four

Computer Science & Information Technology

Column width

A) is best left unchanged unless you absolutely have to. B) is adjustable so you can display more or less characters in a column. C) is not adjustable so keep the formulas as short as possible. D) always switches back to default.

Computer Science & Information Technology