Which type of Trojan enables the attacker to upload, download, or move files on the victim machine?
a. Remote access
b. Data sending
c. FTP
d. Security software disabler
ANS: C
Computer Science & Information Technology
You might also like to view...
One benefit of normalization is the improvement of referential integrity enforcement in relationships
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) ____ communicates using upstream and downstream frequencies (channels) that are already allocated by a cable service.
A. terminal adapter B. DCE C. intelligent adapter D. cable modem
Computer Science & Information Technology