Multiple Choice
________ are viruses that masquerade as useful programs or files.
A) Spyware programs
B) Worms
C) Spoofs
D) Trojan horses
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q46: What is the difference between pilot installation
Q63: A public key is used for decoding
Q64: Phishing is a social engineering technique for
Q65: A test plan is an informal description
Q66: Briefly explain the modeling activity of BPM.
Q67: Account administration and systems procedures are examples
Q69: Which of the following is a disadvantage
Q70: BPM is a recurring process for systematically
Q71: _ refers to social engineering in which
Q73: Briefly describe management's role in information systems