COGNITIVE ASSESSMENT
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?

A. worm
B. rootkit
C. trojan horse
D. virus


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Asymmetric encryption utilizes only a public key for encryption and decryption. 2. Asymmetric encryption can be used for confidentiality but not for authentication. 3. Asymmetric encryption transforms plaintext into ciphertext. 4. Plaintext is transformed into ciphertext using two keys and a decryption algorithm. 5. A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine.

Computer Science & Information Technology

An alternative to the pass by value function call in which the called function receives a copy of a structure is a(n) ____ function.

A. pointer reference B. pass by reference C. global reference D. array reference

Computer Science & Information Technology

A PXE boot requires an optical disc to be installed to boot and start the imaging process

Indicate whether the statement is true or false

Computer Science & Information Technology

____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.

A. Kerberos B. NTLM C. LDAP D. Digest

Computer Science & Information Technology