A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge

A. adware
B. digital certificate
C. grayware
D. keylogger
E. dictionary attack
F. social engineering
G. tailgating
H. Trojan
I. zombie
J. worm


zombie

Computer Science & Information Technology

You might also like to view...

The ________ task pane tracks all of the objects that display on a slide

A) Slide B) Object C) Selection D) Layout

Computer Science & Information Technology

The element is an empty element

Indicate whether the statement is true or false

Computer Science & Information Technology

?The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

PMPs are mostly of two types, music and media players but much of what they can do can also be done on _____

A. Tablets B. Smartphones C. laptops D. all of those

Computer Science & Information Technology