Q. When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n) (Solved)

1. zero-day attack

2. trojan horse attack

3. distributed denial of service attack

4. boot sector virus attack

  • b. trojan horse attack
Subscribe Now

Get All Updates & News