A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.

A. denial of service (DoS)
B. zombie
C. logic bomb
D. rootkit

Answer: D

Computer Science & Information Technology

You might also like to view...

When you select other users to follow, you receive all their tweets on your Twitter home page

Indicate whether the statement is true or false

Computer Science & Information Technology

When using date data, the date is surrounded by ________

A) parentheses ( ) B) pound signs # # C) brackets [ ] D) braces { }

Computer Science & Information Technology