A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.?
Fill in the blank(s) with the appropriate word(s).
Trojan horse
Computer Science & Information Technology
You might also like to view...
Which of the following operations has the highest precedence?
a. Postincrement. b. Multiplication. c. Addition. d. Assignment.
Computer Science & Information Technology
Account policies settings are located in which of the following?
A. NAP B. local security policy C. EFS security policy D. remote policy
Computer Science & Information Technology