COGNITIVE ASSESSMENT
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

A. a virus
B. a worm
C. a Trojan horse
D. a rootkit

Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following functions measures how widely values are dispersed from the mean value?

A) Maximum B) Standard Deviation C) Variance D) Count

Computer Science & Information Technology

A validity table is a tabular record of the state and context of each packet in a conversation between an internal and external user or system.  __________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology