Trojan horse viruses are difficult to detect because ________.

a) they hide within the system until a certain time or condition is met
b) they allow a malicious user access to the system
c) they do not require any user action to be activated
d) they appear to be legitimate programs


d) they appear to be legitimate programs

Computer Science & Information Technology

You might also like to view...

As a result of ____, data can be stolen or altered.

A. extrusion B. invasion C. intrusion D. port scanning

Computer Science & Information Technology

What query type can you create to assist in copying records from a linked table?

A) Copy/Paste B) Append C) Make table D) Update

Computer Science & Information Technology

Devices that put data on the local loop are called _______________? (Choose all that apply.)

a. Data circuit-terminating equipment b. Data communications equipment c. Data connection equipment d. Data terminal equipment

Computer Science & Information Technology

What is the advantage of using masks to hide and reveal content?

What will be an ideal response?

Computer Science & Information Technology