Which of the following is an application that appears to be benign but actually performs a malicious activity?

A) Virus
B) Spyware
C) Trojan horse
D) Worm

C) Trojan horse

Computer Science & Information Technology

You might also like to view...

Which of the following retains information that has been entered through input devices?

a) central processing unit b) memory unit c) arithmetic and logic unit d) output unit

Computer Science & Information Technology

In an unordered list, the default bullet character is a(n) ____, but you can use the CSSlist-style-typeproperty to specify a different bullet shape.

A. dash B. solid circle C. open circle D. asterisk

Computer Science & Information Technology