What type of malware attack occurs when certain conditions are met?

A. Denial-of-service attack
B. Rootkit
C. Logic bomb


C. Logic bomb

Computer Science & Information Technology

You might also like to view...

Running a macro when the user interacts with an object in the database is called ____ programming.

A. macro B. object C. structural D. event-driven

Computer Science & Information Technology

Because security-in-depth has been adopted as a goal of your company, a security analyst was hired to complete a security audit. During the audit, the security analyst suggests that your company adopt a companywide security policy. Of which type of controls is this policy?

A. Administrative control B. Technical control C. Physical control D. Corrective control E. Preventive control F. Recovery control G. Statements b and d only H. Statements a and e only I. Statements c and f only

Computer Science & Information Technology

Critical Thinking QuestionsCase 1-1Sally is a very active real estate agent. She is looking to purchase a new computer so she can keep track of her client's accounts, access the Internet from anywhere in the city and touch-up photos of real estate properties. Sally decides that she will buy a desktop computer for her office as well as a mobile device for use on the road. For the desktop computer, she is trying to decide on an access provider, but she is unclear about the terminology and what she would get with each kind of provider. What can you tell her?

What will be an ideal response?

Computer Science & Information Technology

How many channels does the 802.11ac standard provide for communication between the access point and clients?

a. 4 b. 6 c. 8 d. 11 e. 2

Computer Science & Information Technology