1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
10

A malware-infected networked host under the remote control of a hacker is commonly referred to as:

Computers and Technology
2 answers:
natali 33 [55]3 years ago
7 0

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

nekit [7.7K]3 years ago
3 0

Answer:

Option C i.e., Bot is the correct option.

Explanation:

Because the bot is also a malware the infects the whole computer system and host's network by the hackers, using the remote control by which they remotely controlled the user's system without the permission of the user for the purpose of stealing the confidential data and the information from the computer system of the user they aimed.

You might be interested in
What is the title of RFC 4890 and what year was this RFC published?
Phantasy [73]

Answer:

The title of RFC 4890 is "Recommendations for Filtering ICMPv6 Messages in Firewalls" and it was published in 2007.

Explanation:

RFC 4890 is the memo that was published in 2007. This document is about the recommendations of filtering messages that are harmful and having security risk for Internet Control Message Protocol ICMP version 6.

In this document different types of risk associated ICMPv6 protocol while forwarding messages. This memo recommends filtering techniques to drop the harmful messages and make the communication secure.

4 0
3 years ago
On which tab are import and export commands located in Access? A. Home B. Database Tools C. External Data D. Create
Ann [662]

Answer:

C. External Data

Explanation:

On the External Data tab, you can find import and export commands located in Access.

7 0
3 years ago
Well this isn't school related, but how do i watch dubbed and subbed anime for free on my computer?
Shtirlitz [24]
Crunchyroll or my anime list. Both of these work.

Hope this helps you

3 0
4 years ago
Read 2 more answers
an error message is displayed during windws startup about a service that has failed to start, and then the system locks up. You
Tanzania [10]

Answer:

1:-Launch Windows RE and perform a Start Repair.

2:- Until you pick the Last Documented Successful Configuration on the Advanced Boot Options menu are the correct answer of this question.

Explanation:

Technology company Rescue is a Software restore tool capable of fixing some device issues that can prevent Microsoft for operating. Install Repair checks your Computer for the problem and then attempts to fix it, so that your Computer can start properly.

The Enhanced Boot Preferences app lets you connect to the internet in advanced mode for troubleshooting.

4 0
3 years ago
At some point in your driving career, you will most likely be faced with an oncoming vehicle swerving into your travel lane. tru
aleksley [76]

I believe the answer is True.

7 0
3 years ago
Other questions:
  • Write a function DrivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar
    12·1 answer
  • How is technology closely linked to creativity
    15·1 answer
  • Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
    14·1 answer
  • Understanding the link between education and your desired career is an integral part of your career _______.
    7·2 answers
  • Write the algorithm and draw a flowchart to display the greatest number among any two different numbers....
    5·1 answer
  • How does abstraction help us write programs
    11·1 answer
  • Requests to retrieve data written in a language such as SQL are called…
    8·1 answer
  • In cell b12 create a formula using max f7nction to calculate maximum value in B4:B9
    7·1 answer
  • What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
    15·1 answer
  • what must you consider when determining the efficiency of an algorithm? select two choices. group of answer choices the amount o
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!