Answer:
the answer is
c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.
Physical Components to a computer are called hardware.
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
Answer:
I believe the answer should be C)
Sorry if it’s wrong,but hope it helps
The answer is C because they want you to compare it your or others lives.