A ___________ is a program that poses as a useful or legitimate program, but turns out to be
malicious code.
A.
Worm
B.
Trojan Horse
C.
Logic Bomb
D.
Polymorphic Virus
A ___________ is a program that poses as a useful or legitimate program, but turns out to be
malicious code.
A ___________ is a program that poses as a useful or legitimate program, but turns out to be
malicious code.
A.
Worm
B.
Trojan Horse
C.
Logic Bomb
D.
Polymorphic Virus