A(n) _____ is a security threat that disguises itself as legitimate software

Fill in the blank(s) with correct word

Trojan or Trojan horse10

Computer Science & Information Technology

You might also like to view...

Password _________ is a measure in bits of a password's unpredictability.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can open the Insert Hyperlink dialog box by ____ the task and then clicking Hyperlink on the shortcut menu.

A. clicking B. right-clicking C. double-clicking D. dragging the task to the Hyperlink bar

Computer Science & Information Technology