What component can be used to reduce the risk of a Trojan program or rootkit sending information from an attacked computer to a remote host?
a. Base-64 decoder
b. Keylogger
c. Telnet
d. Firewall
Answer: d. Firewall
Computer Science & Information Technology
You might also like to view...
________ view hides the tracked changes and shows the unchanged documents
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ________ is the value of an asset at the end of its useful life
Fill in the blank(s) with correct word
Computer Science & Information Technology
When ____ is selected in the Word Options dialog box you will be able to affect how the document looks on the screen and when printed.
A. Display B. Print C. Show D. Appearance
Computer Science & Information Technology
A scroll bar appears on the edge of a window any time there is more content than can appear in the window at its current size.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology