Which of the following sequence of events best describes an online intrusion?

A. Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.
B. A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C. A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device.
D. None of the above.

Answer: A

Computer Science & Information Technology

You might also like to view...

MATCH and INDEX are logical functions

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) _____, such as Microsoft Outlook, includes a private calendar, a to-do list, and powerful contact management features.

A. ?personal information manager (PIM) B. ?enterprise architecture C. ?swim lane D. ?fact-finding application

Computer Science & Information Technology