Which type of Trojan enables the attacker to upload, download, or move files on the victim machine?

a. Remote access
b. Data sending
c. FTP
d. Security software disabler

ANS: C

Computer Science & Information Technology

You might also like to view...

One benefit of normalization is the improvement of referential integrity enforcement in relationships

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____ communicates using upstream and downstream frequencies (channels) that are already allocated by a cable service.

A. terminal adapter B. DCE C. intelligent adapter D. cable modem

Computer Science & Information Technology