A Trojan horse
A) burrows into a computer's memory and replicates itself into areas of idle memory
B) is a destructive program triggered by some predetermined event
C) allows unauthorized access to a system without going through normal log-on procedures
D) captures IDs and passwords from unsuspecting users
Correct Answer:
Verified
Q22: Which of the following is not a
Q23: Examining programmer authority tables for information about
Q24: Which of the following is not an
Q25: All of the following will reduce the
Q26: The operating system performs all of the
Q28: A firewall is a hardware partition designed
Q29: The checkpoint feature
A)makes a periodic backup of
Q30: Transaction logs are permanent records of transactions
Q31: Public key encryption
A)uses one key for encoding
Q32: A software program that allows access to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents