
A way back into a system that an attacker can use to get into the compromised computer later is called a ________.(Choose the most specific answer.)
A) backdoor
B) Trojan horse
C) compromise
D) rootkit
Correct Answer:
Verified
Q28: Methods that hackers use to break into
Q43: Hackers send probe packets to identify _.
A)IP
Q44: What are the most dangerous types of
Q45: The last stage in a hacking attack
Q47: Hackers identify possible victim computers by sending
Q49: The last stage in a hacking attack
Q50: DoS attacks attempt to _.
A)hack a computer
B)reduce
Q51: It is still hacking if a person
Q52: Cyberwar attacks are made by national governments
Q53: Which of the following can be a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents