Which type of Trojan is usually set up as a client/server program that allows the attacker full control over the system?
a. Remote access
b. Data hiding
c. e-Banking
d. Proxy
ANS: A
Computer Science & Information Technology
You might also like to view...
A ________ query prompts a user for criteria before running the query
A) user input B) select C) parameter D) crosstab
Computer Science & Information Technology
You are implementing network access to a new business partner that will work with the development team on a new product. Which of the following would best mitigate risk associated with allowing this new partner access to the network?
a. Network segmentation b. ACLs c. VPN implementation d. Log analysis
Computer Science & Information Technology