Which of the following Trojan's action would allow an attacker to gain access to the victim's system?

a. Delete files on the computer.
b. Launch a DoS attack.
c. Spread other malware.
d. Install a backdoor.
e. Search for bank and other personal information.


ANS: D

Computer Science & Information Technology

You might also like to view...

The following code should display whether integer value is odd or even:

``` switch (value % 2) { case 0: Console.WriteLine("Even integer"); case 1: Console.WriteLine("Odd integer"); } ```

Computer Science & Information Technology

One way to prevent page numbers from appearing on the first page of a report is to select the Different First Page option on the ________ tab of the Header & Footer Tools contextual tab

A) Design B) Edit C) Layout D) View

Computer Science & Information Technology

ECC memory is primarily used in which of the following computers?

A. Tablet B. Desktop C. Server D. Laptop

Computer Science & Information Technology

You can change settings, such as making the right button the primary mouse button if you are left-handed, in the Word Options dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology