A ________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
A. zombie
B. worm
C. Trojan horse
D. virus
Answer: C
You might also like to view...
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
A. WAF B. NIDS C. Routers D. Switches
In the figure above, the animation lasts for _________________frames.
Fill in the blank(s) with the appropriate word(s).
On an area chart, the portions are wedge shaped
Indicate whether the statement is true or false
Answer the following statement(s) true (T) or false (F)
1. The math function atan(x) returns one tangent of x in radians. 2. A hierarchy chart shows all the steps that are taken inside a function 3. A local variable can be accessed from anywhere in the program. 4. Different functions can have local variables with the same names. 5. Unfortunately, there is no way to store and call on functions when using turtle graphics.