题目内容

Remote administration types are an example of one kind of(71)malicious software, the Trojan horse, or more simply Trojan. The purpose of these programs isn't replication,(72)to penetrate and control. That masquerade as one thing when in fact they are something else, usually something destructive. There are a number of kinds of Trojans, including spybots, (73) report on the Web sites a computer user visits, and keybots or keyloggers, which record and report the user's keystrokes in order to discover passwords and other confidential information.
RATS attempt to give a remote intruder administrative control of an infected computer. They work as(74)pairs. The server resides on the infected machine, while the client resides elsewhere, across the network, where it's available to a remote intruder. Using standard TCP/IP or UDP protocols, the client sends instructions to the server. The server does(75) it's told to do on the infected computer.

A. nonviral
B. unviral
C. inviral
D. abviral

查看答案
更多问题

A.itern.ino=sales.inoB.market.mno=sales.mnoC.item.ino=sales.ino AND market.mno=sales.m

A. itern.ino=sales.ino
B. market.mno=sales.mno
C. item.ino=sales.ino AND market.mno=sales.mno
D. item.ino=sales.ino OR market.mno=sales.mno

PERT图常用于管理项目进度,某PERT图如图13-13所示。其中,4号顶点的最迟开始时间、8号顶点的最早开始时间两个信息未知。
那么,4号顶点的最迟开始时间、8号顶点的最早开始时间分别为(16)、(17),该PERT图的关键路径为(18)。

A. 4
B. 6
C. 17
D. 33

谢某是“飞鸿”软件开发公司的软件工程师,公司要求他为公司开发了一套“考勤管理系统”,由公司承担责任,用于公司的内部人员考勤。则谢工享有此软件的(57),除(57)外,(58)归“飞鸿”软件公司享有。

A. 不享有任何权力
B. 著作权
C. 署名权
D. 发表权
E. 修改权

一台PC计算机系统启动时,首先执行的是(42),然后加载(43)。在设备管理中,虚拟设备的引入和实现是为了充分利用设备,提高系统效率,采用(44)来模拟低速设备(输入机或打印机)的工作。
已知A、B的值及表达式A2/(5A+B)的求值过程,且A、B已赋值,则该公式的求值过程可用前驱图(45)来表示,若用P-V操作控制求值过程,需要(46)的信号量。

A. 主引导记录
B. 分区引导记录
C. BIOS引导程序
D. 引导扇区

答案查题题库