What appears to be a legitimate program but is actually malicious?

a. Trojan horse
b. Virus hoax
c. Windows Defender


A. Trojan horse

Computer Science & Information Technology

You might also like to view...

The ________ bar displays information about the document or other file on which you are working

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is a popular VMM in the Linux world?

A. Hyper-V B. Parallels C. Fusion D. KVM

Computer Science & Information Technology

A(n) ________ is usually a live broadcast of audio and video content over the Internet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following doesn't attach itself to a host but can replicate itself?

a. Worm b. Virus c. Trojan program d. Buffer overflow

Computer Science & Information Technology