Multiple Choice
A _____ is used by attackers to execute files,access logs,monitor user activity,and change a computer's configuration.
A) scareware
B) patch
C) rootkit
D) worm
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: A Trojan horse abuses email systems to
Q2: Which of the following is true of
Q3: Which of the following statements best describes
Q5: Which of the following is true of
Q6: Which of the following defines computer forensics?<br>A)It
Q7: _ is the unintended access of sensitive
Q8: Identify a true statement about the bring
Q9: Identify the attack in which a malicious
Q10: The additional security option,used for credit card
Q11: _ is the abuse of email systems