Multiple Choice
Trojan horses can get onto computers by ________.
A) self-propagation
B) hackers
C) Both A and B
D) Neither A nor B
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q77: When a packet that is part of
Q77: _ is the general name for proofs
Q79: What does a hacker usually do IMMEDIATELY
Q80: Hackers send probe packets to identify _.<br>A)IP
Q81: Electronic signatures provide message-by-message _.<br>A)integrity<br>B)authentication<br>C)Both A and
Q83: In digital certificate authentication,the verifier uses _.<br>A)the
Q84: The password Security7 can be defeated most
Q85: Which of the following can be a
Q86: Credit card number thieves are called _.(Pick
Q87: Scripts are normally bad.