Multiple Choice
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:
A) rootkits.
B) trojans.
C) viruses.
D) worms.
E) honeypots.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q50: Many U.S. technology firms believe that U.S.
Q51: One of the reasons one should be
Q52: Hackers might infiltrate computer systems to enlist
Q53: _ are highly restrictive programs that permit
Q54: Which of the following types of infiltration
Q56: Web sites of reputed companies can also
Q57: Worms require an executable (a running program)
Q58: Multiple administrators jointly controlling key systems are
Q59: Challenge questions offered by Web sites to
Q60: What is the key takeaway from the