Which type of Trojan enables the attacker to upload, download, or move files on the victim machine?

a. Remote access
b. Data sending
c. FTP
d. Security software disabler


ANS: C

Computer Science & Information Technology

You might also like to view...

Select all that apply. Which of the following statement(s) about global variables is(are) true?

a. A global variable is accessible only to the main function. b. A global variable is declared in the high-est-level block in which it is used. c. A global variable can have the same name as a variable that is declared locally within a function. d. A global variable is the same as a named constant. e. If a function contains a local variable with the same name as a global variable, the global variable's name takes precedence within the function.

Computer Science & Information Technology

When a recursive model calls only itself, it is known as a(n) __________ recursion.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

All statements contained within a compound statement constitute a single block of code.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A biometric policyis a set of ___________ that indicate the applicability of a biometric reference template for use by some community or class of applications that have common security requirements.

A. rules B. standards C. policies D. guidelines E. none of the above

Computer Science & Information Technology