Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?
a. Trojan
b. bundler
c. zombie
d. rootkit
c
Criminal Justice
You might also like to view...
Discuss the major criticisms of radical-critical criminology
What will be an ideal response?
Criminal Justice
Intake officers:
a. have broad discretionary powers. b. can sentence juveniles to long term detention. c. can order the release of youths from industrial schools. d. are normally appointed by the mayor.
Criminal Justice
What are the limitations on prosecutorial discretion?
What will be an ideal response?
Criminal Justice
The right to privacy is created by _____.
a. the First Amendment b. the Fourth Amendment c. the Fifth Amendment d. Griswold v. Connecticut
Criminal Justice