____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

A. Viruses
B. Worms
C. Spam
D. Trojan horses


Answer: D

Computer Science & Information Technology

You might also like to view...

What does the tcpdump host 192.168.1.100 command do?

A. It only captures traffic originating from and destined to 192.168.1.100. B. It only captures traffic originating from 192.168.1.100. C. It only captures traffic destined to 192.168.1.100. D. It only captures traffic destined to the default host 192.168.1.1.

Computer Science & Information Technology

Baseline information is available only in Variance view.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A good name for a method that would set the value of instance variable number while ensuring its validity is ________

a) number b) set c) setNumber d) setValid

Computer Science & Information Technology

Which of the following JavaScript statements will correctly write the XHTML to display a heading with the text "Job Openings" in italic, followed by a horizontal line?

A) document.writeln("

", "Job Openings

".italics(), "
"); B) document.writeln("

", "Job Openings".italics(), "

", "
"); C) document.writeln("

Job Openings

".italics(), "
"); D) document.writeln("

Job Openings.italics()

", "
");

Computer Science & Information Technology