An application is downloaded from the Internet to perform disk cleanup and to delete unnecessary temporary files. The application is also recording network login data and sending it to another party. This application is best described as which of the following?

A.
A virus
B.
A Trojan horse
C.
A worm
D.
A logic bomb
Explanation:
B: A Trojan horse looks like an innocent and helpful program, but in the background it is carrying out some type of malicious activity unknown to the user. The Trojan horse could be corrupting files, sending the users password to an attacker, or attacking another computer.
A Trojan horse is to steal data to outside party
0
0