Trojans can perform which of the following actions?
a. Delete files on the computer.
b. Launch a DoS attach.
c. Open a backdoor.
d. All the above.
ANS: C
Computer Science & Information Technology
You might also like to view...
Which of the following is a disadvantage of the individual policy approach to creating and managing ISSPs?
A. can suffer from poor policy dissemination, enforcement, and review B. may skip vulnerabilities otherwise reported C. may be more expensive than necessary D. implementation can be less difficult to manage
Computer Science & Information Technology
What are the two fundamental components of data structures?
What will be an ideal response?
Computer Science & Information Technology