McqMate
| Q. |
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a(n) |
| A. | Zero-day Attack |
| B. | Trojan Horse Attack |
| C. | Distributed Denial of Service Attack |
| D. | Boot Sector Virus Attack |
| Answer» B. Trojan Horse Attack | |
View all MCQs in
Philosophy of InformaticsNo comments yet