Multiple Choice
A Trojan horse might allow a hacker to _____.
A) see the contents of your screen
B) capture your login keystrokes
C) control your Webcam
D) all of the above
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q38: To configure Internet Explorer to block third-party
Q39: The data carried by Wi-Fi signals can
Q40: A(n) worm is a computer program that
Q41: The practice of searching the Internet for
Q42: You should configure _ to set Windows
Q44: Modern antivirus software attempts to locate viruses
Q45: Which of the following is another term
Q46: Compression utilities scramble the data in a
Q47: Another name for a Web bug is
Q48: A _ attack is designed to generate