Trojan horse viruses are difficult to detect because ________.
a) they hide within the system until a certain time or condition is met
b) they allow a malicious user access to the system
c) they do not require any user action to be activated
d) they appear to be legitimate programs
d) they appear to be legitimate programs
You might also like to view...
As a result of ____, data can be stolen or altered.
A. extrusion B. invasion C. intrusion D. port scanning
What query type can you create to assist in copying records from a linked table?
A) Copy/Paste B) Append C) Make table D) Update
Devices that put data on the local loop are called _______________? (Choose all that apply.)
a. Data circuit-terminating equipment b. Data communications equipment c. Data connection equipment d. Data terminal equipment
What is the advantage of using masks to hide and reveal content?
What will be an ideal response?