Which of the following exploits might hide its destructive payload in a legitimate application or game?
a. Trojan program
b. Macro virus
c. Worm
d. Buffer overflow
Answer: a. Trojan program
You might also like to view...
How do you call the function to read a whole line of input(up to 80 characters) from the keyboard into a c-string named str?
Fill in the blank(s) with the appropriate word(s).
One of the most widely used multiple-encryption schemes is __________ .
Fill in the blank(s) with the appropriate word(s).
What is the difference between “straight” and “cross-connected” input ports?
What will be an ideal response?
Analyze the following code:
``` public class Test { public static void main(String[] args) { int[] x = {1, 2, 3, 4}; int[] y = x; x = new int[2]; for (int i = 0; i < x.length; i++) System.out.print(x[i] + " "); } }``` a. The program displays 1 2 3 4 b. The program displays 0 0 c. The program displays 0 0 3 4 d. The program displays 0 0 0 0