McqMate
| Q. |
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user’s computer, this is called a(n) |
| A. | zero-day attack |
| B. | trojan horse attack |
| C. | distributed denial of service attack |
| D. | boot sector virus attack |
| Answer» B. trojan horse attack | |
View all MCQs in
Informatics and PhilosophyNo comments yet