A Trojan can do which of the following?

a. Delete files.
b. Open a backdoor on the infected system.
c. Install a key logger or other spyware on the infected system.
d. All the above.


ANS: D

Computer Science & Information Technology

You might also like to view...

A ________ can be set on the fields that make each record ________

A) Primary Key, unique B) Tertiary Key, unique C) Primary Key, the same D) Tertiary Key, the same

Computer Science & Information Technology

When exporting Access data into an existing workbook, if you use the ________ to export selected records, the original data in the Excel workbook is overwritten

Fill in the blank(s) with correct word

Computer Science & Information Technology

Fill in the blank with the correct response. The three __________ references were called before they were extended an interview.?

A. ?finalists B. ?finalist's C. ?finalists'

Computer Science & Information Technology

Assume x = 4, which of the following is true?

a. !(x == 4) b. x != 4 c. x == 5 d. x != 5

Computer Science & Information Technology