Multiple Choice
Match each item with a statement below.
-A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
A) botnet
B) rootkit
C) Trojan
D) Ping of Death
E) DoS
F) Man-in-the-Middle
G) keyloggers
H) malware
I) virus
J) ransomware
Correct Answer:

Verified
Correct Answer:
Verified
Q20: Explain the advantages of application whitelisting?
Q21: Which type of security is specifically concerned
Q22: What type of malicious procedure involves using
Q23: When a computer hacker uses multiple compromised
Q24: Whitelisting allows only approved programs to run
Q26: What is spyware and how does it
Q27: Match each item with a statement below.<br>-Attackers
Q28: What is a DDoS attack?
Q29: Match each item with a statement below.<br>-Malicious
Q30: Describe the basic function and creation process