What appears to be a legitimate program but is actually malicious?
a. Trojan horse
b. Virus hoax
c. Windows Defender
A. Trojan horse
Computer Science & Information Technology
You might also like to view...
The ________ bar displays information about the document or other file on which you are working
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is a popular VMM in the Linux world?
A. Hyper-V B. Parallels C. Fusion D. KVM
Computer Science & Information Technology
A(n) ________ is usually a live broadcast of audio and video content over the Internet.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following doesn't attach itself to a host but can replicate itself?
a. Worm b. Virus c. Trojan program d. Buffer overflow
Computer Science & Information Technology