Malware that appears to be desirable software that presents itself as a genuine application is ________
A) virus B) botnet C) worm D) Trojan horse
D
You might also like to view...
Which of the following statements is false?
a. A DirectoryStream enables a program to iterate through the contents of a directory. b. Character-based input and output can be performed with classes Scanner and Formatter. c. A relative path contains all the directories, starting with the root directory, that lead to a specific file or directory. d. Every file or directory on a disk drive has the same root directory in its path.
When you ____ records, you store a list of key fields paired with the storage address for the corresponding data record.
A. index B. sort C. access D. link
What is the maximum number of characters that can exist within a SSID name?
A. 10 B. 12 C. 26 D. 32
A ____ identifies the sender of an e-mail message and may contain additional information, such as a job title and phone number(s).
A. signature line B. greeting line C. subject line D. closing line