Which type of Trojan is usually set up as a client/server program that allows the attacker full control over the system?

a. Remote access
b. Data hiding
c. e-Banking
d. Proxy


ANS: A

Computer Science & Information Technology

You might also like to view...

What is wrong with the following statement? Provide the correct statement to add one to the sum of x and y.

``` System.out.println(++(x + y)); ```

Computer Science & Information Technology

Worldwide, most voice and data SONET rings use this cell-based packet-switching standard.

A. ATM B. Frame Relay C. TCP/IP D. Multi-Protocol Label Switching (MPLS)

Computer Science & Information Technology

BRANCH&BOOK is a valid name for a table in MySQL.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A _________________ is a password-protected file that contains identification about its holder.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology