A ________ appears to be a legitimate program, but is actually something malicious

A) Trojan horse
B) worm
C) rootkit
D) botnet


Answer: A) Trojan horse

Computer Science & Information Technology

You might also like to view...

The putback member function returns to the input stream the previous character obtained by:

a. A get from the input stream. b. Using the stream extraction operator on the input stream. c. Reading input from the keyboard. d. Reading a file from disk.

Computer Science & Information Technology

A bank's automated teller machine (ATM), which restricts authorized users to simple account queries, transfers, deposits, and withdrawals is an example of ____ access control.

A. content-dependent B. constrained user interface C. temporal (time-based) isolation D. classified

Computer Science & Information Technology

A router using a distance-vector routing protocol sends only new information to other routers on the network

a. true b. false

Computer Science & Information Technology

The system file checker helps ensure that critical ______________ are not modified.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology