Which of the following is an example of a Trojan horse program?

A. Netsky
B. MyDoom
C. Klez
D. Happy99.exe


Answer: D

Computer Science & Information Technology

You might also like to view...

Inner and outer joins are two types of joins used in business projects

Indicate whether the statement is true or false

Computer Science & Information Technology

Which attack takes advantage of the TCP three-way handshake?

A. Smurf B. SYN ACK attack C. Fraggle D. Teardrop

Computer Science & Information Technology

For a program to run on a naked machine, it must be represented in binary. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period is known as _____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology