Most trojan horse programs are spread through:
A.
e-mails.
B.
MP3.
C.
MS Office.
D.
Word template.
E.
None of the choices.
Explanation:
“Most trojan horse programs are spread through e-mails. Some earlier trojan horse programs were
bundled in “”Root Kits””. For example, the Linux Root Kit version 3 (lrk3) which was released in
December 96 had tcp wrapper trojans
included and enhanced in the kit. Portable devices that run Linux can also be affected by trojan
horse. The Trojan.Linux.JBellz Trojan horse runs as a malformed .mp3 file.”