Malware that appears to be desirable software that presents itself as a genuine application is ________

A) virus B) botnet C) worm D) Trojan horse


D

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. A DirectoryStream enables a program to iterate through the contents of a directory. b. Character-based input and output can be performed with classes Scanner and Formatter. c. A relative path contains all the directories, starting with the root directory, that lead to a specific file or directory. d. Every file or directory on a disk drive has the same root directory in its path.

Computer Science & Information Technology

When you ____ records, you store a list of key fields paired with the storage address for the corresponding data record.

A. index B. sort C. access D. link

Computer Science & Information Technology

What is the maximum number of characters that can exist within a SSID name?

A. 10 B. 12 C. 26 D. 32

Computer Science & Information Technology

A ____ identifies the sender of an e-mail message and may contain additional information, such as a job title and phone number(s).

A. signature line B. greeting line C. subject line D. closing line

Computer Science & Information Technology