There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system. In this type of malicious code attack, a user launches a non- replicating malware program:

a. Trojan Horse
b. Virus
c. Worm
d. Logic Bomb


a. Trojan Horse

Criminal Justice

You might also like to view...

Collins' "Level 5 leader" has all but which one of the following executive capabilities:

a. has ambition, directed first to the organization and its success b. is infected with an incurable need to produce results" c. exhibits enormous egos d. is self-effacing, quiet, reserved, even shy

Criminal Justice

Which type of sentence offers some of the benefits of juvenile and adults courts but also allows for rehabilitation and redemption?

A. reverse sentencing B. minimum mandatory sentencing C. automatic sentencing D. blended sentencing

Criminal Justice

The use of the phrase "other conditional release" avoids which politically sensitive label?

A) Mandatory parole B) Mandatory release C) Discretionary release D) Discretionary parole E) Selective release

Criminal Justice

The fourth stage of the decomposition process where the body dries out is considered the ________ fermentation stage

Fill in the blank(s) with the appropriate word(s).

Criminal Justice