What can an attacker use that gives them access to a computer program or service that circumvents normal security protections?

A. adware
B. backdoor
C. bot herder
D. botnet


Answer: B

Computer Science & Information Technology

You might also like to view...

The statement int[] list = new int[15]; creates list to be an array of 14 components because array index starts at 0.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ is the default name for a Windows Application project in Visual Studio.

A. WindowsProject1 B. WindowsApplication1 C. WindowsProgram1 D. WindowsLibrary1

Computer Science & Information Technology

One way of protecting Microsoft Outlook is to use a password for opening or modifying documents

Indicate whether the statement is true or false

Computer Science & Information Technology

__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

A. Penetration testing B. Penetration simulation C. Attack simulation D. Attack testing

Computer Science & Information Technology