Which of the following Trojan's action would allow an attacker to gain access to the victim's system?
a. Delete files on the computer.
b. Launch a DoS attack.
c. Spread other malware.
d. Install a backdoor.
e. Search for bank and other personal information.
ANS: D
Computer Science & Information Technology
You might also like to view...
A pseudorandom sequence means the numbers appear random but actually repeat. True or False?
Indicate whether the statement is true or false
Computer Science & Information Technology
What character can be placed before a letter in the Text property value of a ButtonBase object to make the letter function as an access key?
A. & B. % C. $ D. #
Computer Science & Information Technology