Match the following types of programs with their purpose:
I. Trojan
II. crimeware
III. spyware
IV. rootkit
V. DoS
A. causes the server to become overloaded and unable to provide timely service
B. gives an outsider access to the computer's operating system at the admin level
C. tricks the user into granting permission to install it by pretending to be something else
D. monitors a user's behavior and reports it
E. steals information about a user to impersonate them in order to steal money
C, E, D, B, A
You might also like to view...
Case-Based Critical Thinking Questions ? Case 7-3 Juan tells you that your work in Excel will go a lot faster if you start using defined names instead of cell and range addresses. You believe him but you have been frustrated by defined names in the past because you did not know the rules for naming them and you have run into errors as a result. Juan offers to help you. ? ? Which of the following is a true statement Juan can make about defined names as he is explaining the rules to you?
A. The name can include letters, numbers, periods, and underscores B. To distinguish multiword names, use a hyphen between the words C. Defined names are case sensitive D. The name should start with a hash tag
When you have actions you must perform at the end of a try…catch sequence, you can use a ____ block.
A. finally B. catch C. throw D. try
What is the name of the button/command in the Tab Order dialog box that allows Access to reorder your tabs as it sees fit?
A. Tab Order B. Custom Order C. Auto Order D. Auto Tabs
A(n) file is a container that helps you organize your files. _________________________
Answer the following statement true (T) or false (F)