How does a Trojan horse get past security mechanisms to harm a victim?
A. By attaching itself to an existing file
B. By displaying advertisements for intriguing applications
C. By seeming to be a benign item
D. By using system resources to distribute itself to other networked devices
Answer: C. By seeming to be a benign item
Computer Science & Information Technology
You might also like to view...
The MaxDropDownItems property
a) sets the maximum number of items the list can hold b) creates a scrollbar on the list after it exceeds the set max c) creates a max to how many items the user can add to the list d) can be set from 1 to 1000
Computer Science & Information Technology
In the header file of a person class, which of the following is the default constructor?
a) person () ; b) person (int, int); c) person::person ( ); d) person person1;
Computer Science & Information Technology