Trojan-Horse programs
A. | are legitimate programs that allow unauthorized access |
B. | are hacker programs that do not show up on the system |
C. | really do not usually work |
D. | usually are immediately discovered |
Answer : A Explanation : |
|
Option: A Explanation : Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. |