What term could be used to describePage 4cess trol-P1.txtSteves computer?

Charlie is a hacker who has managed to plant a software agent on Stevescomputer and has uninterrupted access to it. He is using Steves computer to inflictmalicious code throughout the internal network. What term could be used to describePage 4cess trol-P1.txtSteves computer?

Charlie is a hacker who has managed to plant a software agent on Stevescomputer and has uninterrupted access to it. He is using Steves computer to inflictmalicious code throughout the internal network. What term could be used to describePage 4cess trol-P1.txtSteves computer?

A.
Zombie

B.
Trapdoor

C.
Master

D.
Threat agent

Explanation:
Attackers commonly gain access to many zombie computers by fooling the users to install zombie software. The zombie software can be spread through e-mail attachments, spyware, or Trojan horses. The zombie software commonly lays dormant until it is called upon by the attacker to attack a victim. Many users’ systems are being used to attack others without the users being aware of this activity.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

I agree with the answer. A