To install backdoors, hackers generally prefer to use:

To install backdoors, hackers generally prefer to use:

To install backdoors, hackers generally prefer to use:

A.
either Trojan horse or computer worm.

B.
either Tripwire or computer virus.

C.
either eavedropper or computer worm.

D.
either Trojan horse or eavedropper.

E.
None of the choices.

Explanation:
A backdoor is a method of bypassing normal authentication procedures.
Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for
customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain
hidden from casual
inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.



Leave a Reply 0

Your email address will not be published. Required fields are marked *