Trojan horses can get onto computers by ________.
A) self-propagation
B) hackers
C) Both A and B
D) Neither A nor B
Correct Answer:
Verified
Q28: Unsolicited commercial e-mail is better known as
Q29: A Trojan horse that sorts through files
Q30: Trojan horses get onto computers by _.
A)viruses
B)hackers
C)Both
Q31: Tricking users into doing something against their
Q32: The general name for malware on a
Q34: Credit card number thieves are called _.(Pick
Q35: It is still hacking if a person
Q37: Scripts are likely to be dangerous only
Q38: Spam can be used to _.
A)implement a
Q49: The last stage in a hacking attack
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents