Which of the following are the two most common actions Trojans take once on the system? Select two answers
a. Delete files on the computer.
b. Launch a DoS attack.
c. Spread other malware.
d. Install a backdoor.
e. Search for bank and other personal information.
ANS: B and D
You might also like to view...
A structure variable can be passed to a procedure or stored in a(n) ____.
A. function B. constant C. variable D. array
Because RTF is designed to work with several programs, it does not support standard alignment options.
Answer the following statement true (T) or false (F)
You use the ________________ menu on the Animation panel to specify when an animation will occur.
Fill in the blank(s) with the appropriate word(s).
Which of the following components of public key infrastructure acts as a verifier for the certificate authority?
A. Authentication authority B. Registration authority C. Certificate management system D. Validation authority