Multiple Choice
A way back into a system that an attacker can use to get into the compromised computer later is called a ________.(Choose the most specific answer.)
A) backdoor
B) Trojan horse
C) compromise
D) root exploit
E) rootkit
Correct Answer:

Verified
Correct Answer:
Verified
Q61: Attacking your own firm occurs in _.<br>A)vulnerability
Q62: Which of the following is true?<br>A)Guidelines must
Q63: It is still hacking if a person
Q66: _ is lying to get victims to
Q67: Unsolicited commercial e-mail is better known as
Q68: DoS attacks attempt to _.<br>A)hack a computer<br>B)reduce
Q69: Prepare2 can be cracked most quickly by
Q70: Electronic signatures provide message-by-message _.<br>A)authentication<br>B)confidentiality<br>C)Both A and
Q96: Antivirus programs can usually stop directly-propagating worms.
Q152: Passwords are widely used because they offer