Which of the following sequence of events best describes an online intrusion?
A. Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.
B. A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C. A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device.
D. None of the above.
Answer: A
Computer Science & Information Technology
You might also like to view...
MATCH and INDEX are logical functions
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) _____, such as Microsoft Outlook, includes a private calendar, a to-do list, and powerful contact management features.
A. ?personal information manager (PIM) B. ?enterprise architecture C. ?swim lane D. ?fact-finding application
Computer Science & Information Technology