Which of the following refers to any program that invites the user to run it but conceals a harmful or malicious payload?
Which of the following terms is used more generally for describing concealment routines in a malicious program?
In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as:
Which of the following software tools is often used for stealing money from infected PC owner through taking control of the modem?