Which of the following refers to any program that invites the user to run it but conceals a harmful or malicious payload?
Which of the following terms is used more generally for describing concealment routines in a malicious program?
In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as: