Which of the following exploits might hide its destructive payload in a legitimate application or game?

a. Trojan program
b. Macro virus
c. Worm
d. Buffer overflow

Answer: a. Trojan program

Computer Science & Information Technology

You might also like to view...

Which of the following describes an IP address?

a. It is referred to as a dotted quad. b. It identifies any computer connecting to the Internet. c. It identifies a website. d. all of the above

Computer Science & Information Technology

Which of the following is not a standard document property?

A. author B. date the presentation file was created or changed C. title D. subject

Computer Science & Information Technology