Q. When hacker use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a (Solved)
1. zero-day attack
2. trojan horse attack
3. distributed denial of service attack
4. boot sector virus attack
- b. trojan horse attack