Which of the following is a remote software attack from outside the system that requires a user inside the system to take some type of action?
A) The attacker has a back door into the system with a password created by a programmer and known only to him or her.
B) A computer programmer hides a Trojan horse in a program that will activate at a later time.
C) A worm is attached to a regular program that performs the malicious actions when a file or link is opened.
D) The attacker uses zombies or bots from many computers to request information from the company's computer.
Correct Answer:
Verified
Q6: Unintentional threats to information systems include all
Q7: An information resource's vulnerability is _.
A) any
Q8: Which of the following types of remote
Q9: Which of the following is NOT a
Q10: Information security controls designed by a company
Q12: Organizational employees are a weak link in
Q13: A threat is _.
A) any danger to
Q14: Which of the following would be an
Q15: Protecting an organization's information is becoming increasingly
Q16: Which of the following statements about information
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents