Which of the following Trojan's action would allow an attacker to gain access to the victim's system?
a. Delete files on the computer.
b. Launch a DoS attack.
c. Spread other malware.
d. Install a backdoor.
e. Search for bank and other personal information.
ANS: D
You might also like to view...
The following code should display whether integer value is odd or even:
``` switch (value % 2) { case 0: Console.WriteLine("Even integer"); case 1: Console.WriteLine("Odd integer"); } ```
One way to prevent page numbers from appearing on the first page of a report is to select the Different First Page option on the ________ tab of the Header & Footer Tools contextual tab
A) Design B) Edit C) Layout D) View
ECC memory is primarily used in which of the following computers?
A. Tablet B. Desktop C. Server D. Laptop
You can change settings, such as making the right button the primary mouse button if you are left-handed, in the Word Options dialog box.
Answer the following statement true (T) or false (F)