Which of the following are the two most common actions Trojans take once on the system? Select two answers

a. Delete files on the computer.
b. Launch a DoS attack.
c. Spread other malware.
d. Install a backdoor.
e. Search for bank and other personal information.


ANS: B and D

Computer Science & Information Technology

You might also like to view...

A structure variable can be passed to a procedure or stored in a(n) ____.

A. function B. constant C. variable D. array

Computer Science & Information Technology

Because RTF is designed to work with several programs, it does not support standard alignment options.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You use the ________________ menu on the Animation panel to specify when an animation will occur.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following components of public key infrastructure acts as a verifier for the certificate authority?

A. Authentication authority B. Registration authority C. Certificate management system D. Validation authority

Computer Science & Information Technology