Which of the following is an application that appears to be benign but actually performs a malicious activity?

a. Virus
b. Spyware
c. Trojan
d. Worm


ANS: C

Computer Science & Information Technology

You might also like to view...

9) How many bytes are contained within 16-bits, 32-bits, 64-bits?

What will be an ideal response?

Computer Science & Information Technology

Opening a table in Datasheet View enables:

A) entering a description of a field. B) choosing the data type of each field. C) entering data into a field. D) adding and editing fields.

Computer Science & Information Technology

Pocket PCs and small music players are often referred to as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The use of ________ may force agencies to update software licenses or lose company support

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology