Which of the following statements best describes a Trojan?
A) Malicious software that hides into the lower levels of the operating system and opens a backdoor
B) Malicious software that records every key stroke and mouse movement
C) Malicious software that disguises itself as a legitimate program
D) Malicious software that takes the computer data hostage to extort money
C) Malicious software that disguises itself as a legitimate program
Computer Science & Information Technology
You might also like to view...
Referring to the figure shown here, what is the name of the security control indicated by the arrow?
A. Mantrap B. Intrusion prevention system C. Turnstile D. Portal
Computer Science & Information Technology
Programmers refer to a sequence of characters as a ____.
A. string of characters B. stream of characters C. file D. variable
Computer Science & Information Technology