What are trojan horse programs?

Posted by: Pdfprep Category: CISA Tags: , ,

What are trojan horse programs?
A . A common form of internal attack
B . Malicious programs that require the aid of a carrier program such as email
C . Malicious programs that can run independently and can propagate without the aid of a carrier program such as email
D . A common form of Internet attack

Answer: D

Explanation:

Trojan horse programs are a common form of Internet attack.

Leave a Reply

Your email address will not be published.