When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)
A) zero-day attack
B) trojan horse attack
C) distributed denial of service attack
D) boot sector virus attack
Correct Answer:
Verified
Q15: Theft of software comes under ......
A)software piracy
B)intellectual
Q16: ..... is social networking site
A)orkut
B)facebook
C)myspace
D)all of these
Q17: ------- can be referred as the use
Q18: This unlawful acts wherein the computer is
Q19: Which of the following is annoying, but
Q20: Why do you not want too much
Q21: What is the top rule for avoiding
Q22: One scam that lures internet users into
Q24: Virus that travel from computer to computer
Q25: How could hacker use information about you
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents