Which of the following is an example of a Trojan horse program?
A. Netsky
B. MyDoom
C. Klez
D. Happy99.exe
Answer: D
Computer Science & Information Technology
You might also like to view...
Inner and outer joins are two types of joins used in business projects
Indicate whether the statement is true or false
Computer Science & Information Technology
Which attack takes advantage of the TCP three-way handshake?
A. Smurf B. SYN ACK attack C. Fraggle D. Teardrop
Computer Science & Information Technology
For a program to run on a naked machine, it must be represented in binary. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period is known as _____.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology