A _____ is used by attackers to execute files,access logs,monitor user activity,and change a computer's configuration.
A) scareware
B) patch
C) rootkit
D) worm
Correct Answer:
Verified
Q35: Which of the following is true of
Q36: Which of the following statements is true
Q37: Which of the following terms is used
Q38: _ is the act of fraudulently using
Q39: A(n)_ is a network attack in which
Q41: In the context of general security risk
Q42: To reduce the potential for online credit
Q43: Which of the following statements best describes
Q44: Which of the following statements is true
Q45: Identify the primary security threat for mobile
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents