Q. When hackers use a program that pretends to be useful to a user while actually allowing thehacker to gain control of the user’s computer, this is called a(n) (Solved)
1. Zero-day Attack
2. Trojan Horse Attack
3. Distributed Denial of Service Attack
4. Boot Sector Virus Attack
- b. Trojan Horse Attack