Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?

a. Trojan
b. bundler
c. zombie
d. rootkit


c

Criminal Justice

You might also like to view...

Discuss the major criticisms of radical-critical criminology

What will be an ideal response?

Criminal Justice

Intake officers:

a. have broad discretionary powers. b. can sentence juveniles to long term detention. c. can order the release of youths from industrial schools. d. are normally appointed by the mayor.

Criminal Justice

What are the limitations on prosecutorial discretion?

What will be an ideal response?

Criminal Justice

The right to privacy is created by _____.

a. the First Amendment b. the Fourth Amendment c. the Fifth Amendment d. Griswold v. Connecticut

Criminal Justice