How do hackers create a botnet?
A) by infecting Web search bots with malware
B) by using Web search bots to infect other computers
C) by causing other people's computers to become "zombie" PCs following a master computer
D) by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door
Correct Answer:
Verified
Q34: A keylogger is a type of
A) worm.
B)
Q51: Application controls
A) can be classified as input
Q52: Analysis of an information system that rates
Q55: _ controls ensure that valuable business data
Q89: Using numerous computers to inundate and overwhelm
Q90: Evil twins are
A)Trojan horses that appears to
Q93: Electronic evidence on computer storage media that
Q96: Phishing is a form of
A)spoofing.
B)spinning.
C)snooping.
D)sniffing.
Q98: An analysis of the firm's most critical
Q99: Phishing involves
A)setting up bogus Wi-Fi hot spots.
B)setting
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents