Which type of Trojan is usually set up as a client/server program that allows the attacker full control over the system?

a. Remote access
b. Data hiding
c. e-Banking
d. Proxy

ANS: A

Computer Science & Information Technology

You might also like to view...

A ________ query prompts a user for criteria before running the query

A) user input B) select C) parameter D) crosstab

Computer Science & Information Technology

You are implementing network access to a new business partner that will work with the development team on a new product. Which of the following would best mitigate risk associated with allowing this new partner access to the network?

a. Network segmentation b. ACLs c. VPN implementation d. Log analysis

Computer Science & Information Technology