Multiple Choice
Once a _____ is installed, the attacker can gain full access to the computer.
A) botnet
B) zombie
C) worm
D) rootkit
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q12: When the data about Target's customers was
Q13: When you receive a text message that
Q14: As the complexity of a network increases,
Q15: There has been a data breach at
Q16: Computer _ is a discipline that combines
Q18: Your company has acquired Joggers PLC, a
Q19: You recently installed a game that you
Q20: The US-CERT incident reporting system is used
Q21: A _ often creates a "backdoor" on
Q22: Which of the following shortcoming may be