What type of attack does a remote-access Trojan attempt to perpetrate?

A. worm
B. back door
C. remote denial of service
D. composite attack


Answer: B

Computer Science & Information Technology

You might also like to view...

In a selection sort, to change from ascending to descending order, only __________ modifications need to be made to the algorithm.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following correctly initializes a doubly linked list in the default constructor?

A. head = nullptr; back = nullptr; B. head = 0; back = 0; count = 0; C. first = 0; last = 0; D. first = nullptr; last = nullptr; count = 0;

Computer Science & Information Technology

The _______ shows information and errors during setup. Samantha would check these logs if she were having an issue installing or setting up Windows, including after a Windows update.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Formula auditing tools include a tracer ____, which is drawn from a cell that appears in a formula in another cell or from a cell that contains a formula with cell references.

A. arrow B. triangle C. link D. none of the above

Computer Science & Information Technology