Q. When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n) (Solved)

1. Zero-day Attack

2. Trojan Horse Attack

3. Distributed Denial of Service Attack

4. Boot Sector Virus Attack

  • b. Trojan Horse Attack
Subscribe Now

Get All Updates & News