McqMate
Q. |
When hacker use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a |
A. | zero-day attack |
B. | trojan horse attack |
C. | distributed denial of service attack |
D. | boot sector virus attack |
Answer» B. trojan horse attack |
View all MCQs in
General InformaticsNo comments yet