Which of the following refers to a method of bypassing normal system authentication procedures?

Prev Question
Next Question

Which of the following refers to a method of bypassing normal system authentication procedures?

A.
virus

B.
worm

C.
trojan horse

D.
spyware

E.
rootkits

F.
backdoor

G.
None of the choices.

Explanation:
A backdoor is a method of bypassing normal authentication procedures. Many computer
manufacturers used to preinstall backdoors on their systems to provide technical support for
customers. Hackers typically use backdoors to secure remote access to a computer, while
attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use
either Trojan horse or computer worm.

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *