Multiple Choice
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)
A) Zero-day Attack
B) Trojan Horse Attack
C) Distributed Denial of Service Attack
D) Boot Sector Virus Attack
Correct Answer:

Verified
Correct Answer:
Verified
Q7: What is the first step in protecting
Q8: Which of the following is a step
Q9: ------- can be referred as the use
Q10: Virus that travel from computer to computer
Q11: Computers are programmed to make decisions in
Q13: How could hacker use information about you
Q14: Why do you not want too much
Q15: ------ uses software to allow people to
Q16: Google earth is --------<br>A)Entertainment software<br>B)Educational software<br>C)Anti- virus
Q17: This unlawful acts wherein the computer is