A Trojan horse can perform which of the following actions?

A) Erase files on a computer.
B) Launch a DDoS attack.
C) Install a backdoor on a computer.
D) All of the above

D) All of the above

Computer Science & Information Technology

You might also like to view...

The class _______ is the portion of a class that is visible to the application programmer.

a. form b. design c. control d. interface

Computer Science & Information Technology

The ____________________ panel displays messages related to unsupported content.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology