Correct option is C
The correct answer is (c) Trojan Horse
Explanation:
● A Trojan Horse is a type of malware that is often disguised as legitimate software.
● Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.
● Unlike viruses, Trojans do not self-replicate by infecting other files or computers.
Information Booster:
● The name is derived from the Ancient Greek story of the deceptive wooden horse used to invade the city of Troy.
● Common ways of infection: Email attachments, cracked software, and social engineering.
Additional Knowledge:
● Spamming: Sending unsolicited bulk messages.
● Phishing: A method of trying to gather personal information using deceptive e-mails and websites.