A Trojan horse can perform which of the following actions?
A) Erase files on a computer.
B) Launch a DDoS attack.
C) Install a backdoor on a computer.
D) All of the above
D) All of the above
Computer Science & Information Technology
You might also like to view...
The class _______ is the portion of a class that is visible to the application programmer.
a. form b. design c. control d. interface
Computer Science & Information Technology
The ____________________ panel displays messages related to unsupported content.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology