18. Trojan-Horse programs

A. are legitimate programs that allow unauthorized access
B. are hacker programs that do not show up on the system
C. really do not usually work
D. are usually immediately discovered

1 answer

A. are legitimate programs that allow unauthorized access

Trojan-Horse programs, often referred to as Trojans, are malicious software that appear to be legitimate applications. They can deceive users into downloading and installing them, allowing unauthorized access to the user's system. Unlike viruses or worms, Trojans do not replicate themselves but can create backdoors to exploit the system.