COGNITIVE ASSESSMENT
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?
A. worm
B. rootkit
C. trojan horse
D. virus
Answer: B
You might also like to view...
Answer the following statements true (T) or false (F)
1. Asymmetric encryption utilizes only a public key for encryption and decryption. 2. Asymmetric encryption can be used for confidentiality but not for authentication. 3. Asymmetric encryption transforms plaintext into ciphertext. 4. Plaintext is transformed into ciphertext using two keys and a decryption algorithm. 5. A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine.
An alternative to the pass by value function call in which the called function receives a copy of a structure is a(n) ____ function.
A. pointer reference B. pass by reference C. global reference D. array reference
A PXE boot requires an optical disc to be installed to boot and start the imaging process
Indicate whether the statement is true or false
____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.
A. Kerberos B. NTLM C. LDAP D. Digest