Multiple Choice
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)
A) zero-day attack
B) trojan horse attack
C) distributed denial of service attack
D) boot sector virus attack
Correct Answer:

Verified
Correct Answer:
Verified
Q10: Software piracy comes under<br>A)individual's privacy<br>B)intellectual property right<br>C)accountability<br>D)security
Q11: What is the top rule for avoiding
Q12: Which of the following is annoying, but
Q13: Which among shows IT for national integration<br>A)permanent
Q14: In order to be considered "OSI Certified"
Q16: The system involves a concealed transmitter in
Q17: ----- is free online software for creating
Q18: Virus that travel from computer to computer
Q19: ------- is a non-profit corporation formed to
Q20: One scam that lures internet users into