What type of attack does a remote-access Trojan attempt to perpetrate?
A. worm
B. back door
C. remote denial of service
D. composite attack
Answer: B
You might also like to view...
In a selection sort, to change from ascending to descending order, only __________ modifications need to be made to the algorithm.
Fill in the blank(s) with the appropriate word(s).
Which of the following correctly initializes a doubly linked list in the default constructor?
A. head = nullptr; back = nullptr; B. head = 0; back = 0; count = 0; C. first = 0; last = 0; D. first = nullptr; last = nullptr; count = 0;
The _______ shows information and errors during setup. Samantha would check these logs if she were having an issue installing or setting up Windows, including after a Windows update.
Fill in the blank(s) with the appropriate word(s).
Formula auditing tools include a tracer ____, which is drawn from a cell that appears in a formula in another cell or from a cell that contains a formula with cell references.
A. arrow B. triangle C. link D. none of the above