A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.?

Fill in the blank(s) with the appropriate word(s).

Trojan horse

Computer Science & Information Technology

You might also like to view...

Which of the following operations has the highest precedence?

a. Postincrement. b. Multiplication. c. Addition. d. Assignment.

Computer Science & Information Technology

Account policies settings are located in which of the following?

A. NAP B. local security policy C. EFS security policy D. remote policy

Computer Science & Information Technology