COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
A
Root access
B
Administrative access
C
Zero-day vulnerability
D
Backdoor
Explanation: 

Detailed explanation-1: -Backdoor is an undocumented way of gaining access to a program, online service, or an entire computer system.

Detailed explanation-2: -A backdoor is a potential security risk. An undocumented way of gaining access to a computer system. A backdoor is a potential security risk. A malicious program that listens for commands on a certain Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port.

Detailed explanation-3: -Rootkit: A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.

Detailed explanation-4: -Which of the terms listed below refers to an example of a crypto-malware? A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse.

Detailed explanation-5: -Botnets: Collections of compromised systems commonly used in DDoS attacks.

There is 1 question to complete.