A_______ is a malicious program that hides within a friendly program or simulates the identity of a legitimate program or feature, while actually causing damage to the computer or network in the background.

a) Trojan horse.
b) logic bomb.
c) resident virus.
d) None of the above.

a) Trojan horse.

Computer Science & Information Technology

You might also like to view...

What is the difference between a query with a Total row and a totals query?

What will be an ideal response?

Computer Science & Information Technology

A back-end database can be stored in a(n) ________ where a company's technical support can ensure the data are protected and backed up regularly

Fill in the blank(s) with correct word

Computer Science & Information Technology