Distinguish between the following: Trojan horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.
What will be an ideal response?
Trojan horse: hacker back-door virus
Sniffer: intercepts and records electronic traffic
Spyware: tracking online
Trap door: allows the security safeguards to be bypassed
Logic Bomb: virus programs that contain a delay
Stealth Virus: viruses that hide inside computer memory
Phishing: fish for passwords and financial information, usually via e-mail
You might also like to view...
The year and a day rule is considered an outdated common law relic
Indicate whether the statement is true or false
_______________ includes crisis intervention, treatment for youths and their families, outreach, and referral to social services
Fill in the blank(s) with correct word
There can be a sense of ________ associated with working undercover because of the need to essentially betray the trust of those who have come to trust you
Fill in the blank(s) with the appropriate word(s).
What is a Drug Abuse?
What will be an ideal response?