An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)
a. Rootkit
b. Worm
c. Backroot
d. Backdoor
Answer:
a. Rootkit
d. Backdoor
You might also like to view...
After a device is __________, the operating system knows it exists and knows how to communicate with it.
a. read from b. written to c. accessed d. opened
Which of the following is NOT true about editing spreadsheets with Kingsoft's Spreadsheet app?
A) Kingsoft's Spreadsheet app allows for text and formulas to be added to cells in the spreadsheets. B) Kingsoft Spreadsheets has a wide variety of statistical, logical, text, and date and time functions. C) Kingsoft's Spreadsheet app can view and edit headers and footers, view and create comments, and insert a variety of objects into a document. D) The software also includes an embedded on-screen keyboard for easier spreadsheet editing.
Both the containers set and multiset automatically sort their elements according to some sort criteria.
Answer the following statement true (T) or false (F)
Who makes "white box" computers?
a. non-major companies b. Microsoft c. Apple d. Asus