42. A Trojan horse is a. A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation b. A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred c. A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes d. All of the above
42. A Trojan horse is a. A program that performs a legitimate function that is known to an operating system or its user and also has a hidden component that can be used for nefarious purposes like attacks on message security or impersonation b. A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred c. A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes d. All of the above
Chapter14: System Administration
Section: Chapter Questions
Problem 8VE
Related questions
Question
42. | A Trojan horse is |
a. | A |
b. | A piece of code that can attach itself to other programs in the system and spread to other systems when programs are copied or transferred |
c. | A program that spreads to other computer systems by exploiting security holes like weaknesses in facilities for creation of remote processes |
d. | All of the above |
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
![A+ Guide To It Technical Support](https://www.bartleby.com/isbn_cover_images/9780357108291/9780357108291_smallCoverImage.jpg)
A+ Guide To It Technical Support
Computer Science
ISBN:
9780357108291
Author:
ANDREWS, Jean.
Publisher:
Cengage,
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
![A+ Guide To It Technical Support](https://www.bartleby.com/isbn_cover_images/9780357108291/9780357108291_smallCoverImage.jpg)
A+ Guide To It Technical Support
Computer Science
ISBN:
9780357108291
Author:
ANDREWS, Jean.
Publisher:
Cengage,