A Trojan horse is a. A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation b. A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred c. A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes d. All of the above

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter14: System Administration
Section: Chapter Questions
Problem 8VE
icon
Related questions
Question
A Trojan horse is
a. A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation
b. A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred
c. A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes
d. All of the above
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning