Match the following types of programs with their purpose:

I. Trojan
II. crimeware
III. spyware
IV. rootkit
V. DoS

A. causes the server to become overloaded and unable to provide timely service
B. gives an outsider access to the computer's operating system at the admin level
C. tricks the user into granting permission to install it by pretending to be something else
D. monitors a user's behavior and reports it
E. steals information about a user to impersonate them in order to steal money

C, E, D, B, A

Computer Science & Information Technology

You might also like to view...

A technician is working on a new employees workstation in the accounting department? The workstation needs access to the accounting server. Currently the technician notices that the employee can only access the Internet. Which of the following would the technician need to verify?

A. Correct VPN setting B. Correct VLAN setting C. Correct DNS setting D. Correct WINS setting

Computer Science & Information Technology

The first slide rule appeared around ____.

A. 1183 B. 1622 C. 1882 D. 1945

Computer Science & Information Technology