Which of the following exploits might hide its destructive payload in a legitimate application or game?

a. Trojan program
b. Macro virus
c. Worm
d. Buffer overflow


Answer: a. Trojan program

Computer Science & Information Technology

You might also like to view...

How do you call the function to read a whole line of input(up to 80 characters) from the keyboard into a c-string named str?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

One of the most widely used multiple-encryption schemes is __________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the difference between “straight” and “cross-connected” input ports?

What will be an ideal response?

Computer Science & Information Technology

Analyze the following code:

``` public class Test { public static void main(String[] args) { int[] x = {1, 2, 3, 4}; int[] y = x; x = new int[2]; for (int i = 0; i < x.length; i++) System.out.print(x[i] + " "); } }``` a. The program displays 1 2 3 4 b. The program displays 0 0 c. The program displays 0 0 3 4 d. The program displays 0 0 0 0

Computer Science & Information Technology