Q.

When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a(n)

A. Zero-day Attack
B. Trojan Horse Attack
C. Distributed Denial of Service Attack
D. Boot Sector Virus Attack
Answer» B. Trojan Horse Attack
1.4k
0
Do you find this helpful?
10

Discussion

No comments yet