An application that appears to perform a useful function but instead contains some sort of malicious code is called a _____.
A.
Worm
B.
SYN flood
C.
Virus
D.
Trojan Horse
E.
Logic Bomb
Explanation:
A Trojan horse attaches itself to another file, such as a word processing document. Trojan horses may also arrive as part of an e-mail for free game, software, or other file.
Reference: Security + (SYBEX) page 80