Which of the following statements best describes a Trojan?

A) Malicious software that hides into the lower levels of the operating system and opens a backdoor
B) Malicious software that records every key stroke and mouse movement
C) Malicious software that disguises itself as a legitimate program
D) Malicious software that takes the computer data hostage to extort money

C) Malicious software that disguises itself as a legitimate program

Computer Science & Information Technology

You might also like to view...

Referring to the figure shown here, what is the name of the security control indicated by the arrow?

A. Mantrap B. Intrusion prevention system C. Turnstile D. Portal

Computer Science & Information Technology

Programmers refer to a sequence of characters as a ____.

A. string of characters B. stream of characters C. file D. variable

Computer Science & Information Technology