A malicious program that captures your username and password
B.
Malicious code masquerading as or replacing legitimate code
C.
An unauthorized user who gains access to your user database and adds themselves as a user
D.
A server that is to be sacrificed to all hacking attempts in order to log and monitor the hacking activity
The Answer Is:
B
This question includes an explanation.
Explanation:
A Trojan Horse is an apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data.
CEH-001 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 60% Discount on All Products,
Use Coupon: "8w52ceb345"