A ________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

A. zombie
B. worm
C. Trojan horse
D. virus


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?

A. WAF B. NIDS C. Routers D. Switches

Computer Science & Information Technology

In the figure above, the animation lasts for _________________frames.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

On an area chart, the portions are wedge shaped

Indicate whether the statement is true or false

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. The math function atan(x) returns one tangent of x in radians. 2. A hierarchy chart shows all the steps that are taken inside a function 3. A local variable can be accessed from anywhere in the program. 4. Different functions can have local variables with the same names. 5. Unfortunately, there is no way to store and call on functions when using turtle graphics.

Computer Science & Information Technology