1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
3 years ago
10

Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis

trator know if one is on his/her network?
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
4 0

Answer: Remote Access Trojans (RATs) is the malware that is used by the hackers to attack the computer and operating system remotely.The working of RATs is done by download the malware and executing it to create a server .After the server is created ,hacker sends this server along with a crypter to eliminate the antivirus program's function present in the user's system.

Thus, RAT gets invoked in the system of the user and the hacker can control the user's system .Attacker can hack the complete functioning of the user's system and can steal, destroy ,execute etc any confidential data and application.

The user or the network administrator can get to know about the RAT's activity by steps like checking the open port, checking the activities through Task Manager of Windows, observing any unusual activity and appearance of the display screen etc.

You might be interested in
How does Virus transfer from one computer to<br>another computer?​
Daniel [21]

Answer:

Viruses can enter your computer in any number of ways, such as via an email attachment, during file downloads from the Internet or even upon a visit to a contaminated Web site.Jun 2, 2010

Explanation:

Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.

5 0
3 years ago
What helps to identify trends?
vagabundo [1.1K]
Pie graph but idk if thats the answer
4 0
4 years ago
Read 2 more answers
What is the result of segmenting a network with a bridge (switch)? (Choose two)
Ronch [10]

Answer: (D) It makes smaller collision domain and (F) It increases the number of collision domains.

Explanation:

  The result of segmenting a given network with the bridge is that it basically break the domain of the collision that increases the domain number. In additionally, it also makes it more smaller.  

Switch basically expands the quantity of collision network domain in the system. Switches are designed with V-LANs will diminish the given size of domain of the collision by increasing the number of the collision domain in the network.  

7 0
3 years ago
i have a at&amp;t router and a 1000mbs Ethernet cable connecting from that to my net gear r7000 that can push +1000mbs. the cabl
Lady_Fox [76]
DSL ranges from 128Kbps to 3Mbps, so this would be your bottleneck.
7 0
3 years ago
The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _____
Nesterboy [21]

Answer:

Brute force

Explanation:

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.

In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then con
    10·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • What term describes the process of transferring information from one computer to another
    10·1 answer
  • Within the try clause of a try statement, you code a. all the statements of the program b. a block of statements that might caus
    14·1 answer
  • pDevices used to prevent data from being written to a disk can connect to a computer through FireWire, SATA, PATA, and SCSI cont
    10·1 answer
  • Fill in the blank with the correct response.
    9·1 answer
  • I NEED HELP WITH SOME PROBLEM ON BRAINLY PLEASE HELP
    10·1 answer
  • What is Digital Access, and why is it important for YOUR generation?
    9·1 answer
  • What is the different between information and data
    9·1 answer
  • What are the major benefits of preproduction?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!