× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
7
6
o
5
b
4
s
3
j
3
b
3
m
3
K
3
g
3
L
3
w
3
New Topic  
artsyyy123 artsyyy123
wrote...
Posts: 577
Rep: 0 0
6 years ago
Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?
 
  a. Trojan
  b. bundler
  c. zombie
  d. rootkit



Which of the following is NOT a type of Trojan horse discussed in the text?
 
  a. Remote access Trojans
  b. Software Detection Killers
  c. Spyware Trojans
  d. Destructive Trojans



A ____________________ runs off weaknesses in popular software in order to reproduce quickly and can affect tens of thousands of computers in as little as two or three hours.
 
  Fill in the blank(s) with correct word



The cluster size for a particular device is specified in which of the following?
 
  a. master boot record
  b. read-only memory
  c. BIOS parameter block
  d. file allocation table



The unique feature of a worm is that it: infects the memory of a computer.
 
  a. infects the memory of a computer.
  b. is self-replicating.
  c. relies on user intervention.
  d. cannot spread without someone opening an attachment.
Read 56 times
1 Reply
Replies
Answer verified by a subject expert
gsx911gsx911
wrote...
Posts: 303
Rep: 4 0
6 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

artsyyy123 Author
wrote...

6 years ago
You make an excellent tutor!
wrote...

Yesterday
This calls for a celebration Person Raising Both Hands in Celebration
wrote...

2 hours ago
Just got PERFECT on my quiz
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1025 People Browsing
Related Images
  
 80
  
 342
  
 281
Your Opinion
Which industry do you think artificial intelligence (AI) will impact the most?
Votes: 405