Which of the following exploits might hide its destructive payload in a legitimate application or game?
a. Trojan program
b. Macro virus
c. Worm
d. Buffer overflow
Answer: a. Trojan program
Computer Science & Information Technology
You might also like to view...
Which of the following describes an IP address?
a. It is referred to as a dotted quad. b. It identifies any computer connecting to the Internet. c. It identifies a website. d. all of the above
Computer Science & Information Technology
Which of the following is not a standard document property?
A. author B. date the presentation file was created or changed C. title D. subject
Computer Science & Information Technology