A) Trojan horses
B) Keylogger
C) Worm
D) File virus
View Answer
Option – A.
Similar Questions
You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue?
Battle of Tarain was fought in the year ________?
Kiwi is a native bird of Which of the following countries ?
The Bhakra Nangal Multipurpose proje3ct is a joint venture of _____
The population of a town was 1,60,000 three years ago, If it increased by 3%, 2.5% and 5% respectively in the last three years, then the present population in
Which part of the flame is the hottest?
A train-A passes a stationary train B and a pole in 24 sec and 9 sec respectively. If the speed of train A is 48 kmph, what is the length of train B?
Between which one of the following pairs of ports does Panama Canal shorten the distance to the maximum?
Movement of cell against concentration gradient is called
Where did Yuvaraj Singh make his ODI debut