AMA University Answers
Login
Register
AMA OED
Courses
IT
IT-6310
It disguises as useful softwar...
It disguises as useful software.
trojan horse
Correct
Similar IT-6310 questions
It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.
It could be exploited because of an encryption key that was vulnerable to decoding.
It was the first generation security standard for wireless network.
It helps keep data and equipment safe by giving only the appropriate people access.
It uses code to access operating systems and software.