A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.
A. computer virus
B. Trojan
C. worm
D. rootkit
Answer: A
You might also like to view...
Which of the following statements is false?
a. All exceptions must derive from the class Throwable. b. The class Throwable provides the method getStackTrace that outputs the stack trace to the standard error stream. c. The class Throwable provides the method getMessage that returns the descriptive string stored in an exception. d. The string returned from class Throwable’s getMessage method contains the name of the exception’s class.
As part of the setup process for local email, you must have local ____ software.
A. e-mail client B. e-mail system C. e-mail D. POP mail
What are some other fields or areas that are combined with security technology when providing a security solution?
What will be an ideal response?
Which of the terms below does not have a meaning similar to the other three?
a) process b) model c) class d) abstraction