Q.

When hacker use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a

A. zero-day attack
B. trojan horse attack
C. distributed denial of service attack
D. boot sector virus attack
Answer» B. trojan horse attack
2.1k
0
Do you find this helpful?
16

View all MCQs in

General Informatics

Discussion

No comments yet