Multiple Choice
A way back into a system that an attacker can use to get into the compromised computer later is called a ________.(Choose the most specific answer.)
A) backdoor
B) Trojan horse
C) compromise
D) rootkit
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q26: Attackers only need to find a single
Q38: ACLs are used for packets in the
Q60: Policies should drive _.<br>A) implementation<br>B) oversight<br>C) both
Q98: An action that will stop many viruses
Q100: A compromise is an attempted attack.
Q103: What type of attacker are most attackers
Q104: Which of the following is not one
Q105: Security is primarily a management issue.
Q106: The last stage in a hacking attack
Q107: Viruses propagate within a computer by infecting