A ____ is a piece of software that allows an unauthorized user to override security and get administrator access to a computer.

A. worm
B. rootkit
C. virus
D. Trojan horse


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The DropDownStyle property of a combo box must be set at design time. 2. Combo boxes have most of the same properties, events, and methods as list boxes. 3. A list that has dropped down disappears when the user clicks on an item or presses the Enter key. 4. The value of cboBox.Text is the contents of the text box at the top of the combo box. 5. The number of items in cboBox is cboBox.Items.Count.

Computer Science & Information Technology

The conditional expression in the while statement is enclosed within ____________________ following the keyword while.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the protocol or encryption name with the feature.

A. No longer considered secure because the key used for encryption doesn’t change. B. Typically uses TKIP for encryption. C. Typically uses AES for encryption. D. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure. E. Current encryption algorithm used today.

Computer Science & Information Technology

A(n) ________ measures the amount of movement in any direction so that they can detect shaking or rotation

Fill in the blank(s) with correct word

Computer Science & Information Technology