How does a Trojan horse get past security mechanisms to harm a victim?

A. By attaching itself to an existing file
B. By displaying advertisements for intriguing applications
C. By seeming to be a benign item
D. By using system resources to distribute itself to other networked devices

Answer: C. By seeming to be a benign item

Computer Science & Information Technology

You might also like to view...

The MaxDropDownItems property

a) sets the maximum number of items the list can hold b) creates a scrollbar on the list after it exceeds the set max c) creates a max to how many items the user can add to the list d) can be set from 1 to 1000

Computer Science & Information Technology

In the header file of a person class, which of the following is the default constructor?

a) person () ; b) person (int, int); c) person::person ( ); d) person person1;

Computer Science & Information Technology