CISA Certified Information Systems Auditor – Question2444

What are trojan horse programs?

A.
A common form of internal attack
B. Malicious programs that require the aid of a carrier program such as email
C. Malicious programs that can run independently and can propagate without the aid of a carrier program such as email
D. A common form of Internet attack

Correct Answer: D

Explanation:

Explanation:
Trojan horse programs are a common form of Internet attack.