Which of the following statements best describes a Trojan?

A) Malicious software that hides into the lower levels of the operating system and opens a backdoor
B) Malicious software that records every key stroke and mouse movement
C) Malicious software that disguises itself as a legitimate program
D) Malicious software that takes the computer data hostage to extort money


C) Malicious software that disguises itself as a legitimate program

Computer Science & Information Technology

You might also like to view...

You can add tags to a bitmap image

Indicate whether the statement is true or false

Computer Science & Information Technology

Which view is a condensed view of a document that is used in conjunction with styles?

A) Full Screen Reading B) Print Layout C) Outline D) Draft

Computer Science & Information Technology

calcA solves H = kA(T2 - T1) / X for A double calcA (double H, double k, double T2, double T1, double X)

What will be an ideal response?

Computer Science & Information Technology

As you write a VBA statement, IntelliSense technology helps you complete it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology