Which of the following Trojan's action would allow an attacker to gain access to the victim's system?

a. Delete files on the computer.
b. Launch a DoS attack.
c. Spread other malware.
d. Install a backdoor.
e. Search for bank and other personal information.

ANS: D

Computer Science & Information Technology

You might also like to view...

A pseudorandom sequence means the numbers appear random but actually repeat. True or False?

Indicate whether the statement is true or false

Computer Science & Information Technology

What character can be placed before a letter in the Text property value of a ButtonBase object to make the letter function as an access key?

A. & B. % C. $ D. #

Computer Science & Information Technology