A program that looks benign but actually has a malicious purpose is a _______

a. Trojan horse
b. Virus
c. Worm
d. Cookie


Answer A.

Computer Science & Information Technology

You might also like to view...

Explain how a package is named in Java.

What will be an ideal response?

Computer Science & Information Technology

The _________ and _________ block cipher modes of operation are used for authentication.

A. OFB, CTR B. ECB, CBC C. CFB, OFB D. CBC, CFB

Computer Science & Information Technology

Advantages of the if and unless expressions include all of the following except?

A. They allow you to control the execution of one or more code statements B. They can help improve the organization of scripts and make them easier to read and maintain C. They can be used to work with any type of value supported by Ruby D. None of the above

Computer Science & Information Technology

It is possible to edit a GPO from any writable domain controller, or even to connect to a writable domain controller from a client computer running ________

a. Windows 8.1 Pro b. Windows 8.1 Enterprise c. Both Windows 8.1 Pro and Windows 8.1 Enterprise d. None of the above

Computer Science & Information Technology