1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
14

Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering

Computers and Technology
1 answer:
Helen [10]3 years ago
7 0

Trojans depend on social engineering to spread.

Social engineering refers to malicious activities accomplished through human interactions.

Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.

Trojan horses take advantage of the people who need a certain program to operate on their computer system. They use social engineering to bait in endpoint users to download the fake programs.

Find out more on Trojan horses at: brainly.com/question/354438

You might be interested in
after clicking the start button on your computer screen desktop what option would you then select to examines system components
crimeas [40]
Assuming you're using Windows, you have to search for the application Device Manager. It will show you all connected devices on your system, as well as an option to modify drivers and certain options. 
3 0
3 years ago
Creating a newsletter
pav-90 [236]
This isn’t helpful considering no one knows what type of news letter you want
6 0
3 years ago
Describe some common types of charts.​
Mekhanik [1.2K]
Bar chart.
Pie chart.
Line chart.
4 0
3 years ago
Read 2 more answers
Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
gayaneshka [121]

Answer:

A. Define boundaries

C. Deny access

D. Delay access

Explanation:

A barrier is a material or structure used to prevent or block access. Barriers can either be natural or structural and are used for many purposes usually for security reasons. The following are functions of barriers either natural or structural:

  1. Define areas of boundaries
  2. Delay or slow access. Example is the use of speed bumps to slow down vehicles.
  3. Provide access to entrances such as the use of gates
  4. Deny access to unauthorized personnel and allowing authorized personnel.
4 0
3 years ago
Is jesus dead or alive
Morgarella [4.7K]

Answer:

Explanation:

i think he alive but in heaven i dunno

8 0
3 years ago
Other questions:
  • Assume the following variable definitions int a = 5, b = 12; double x = 3.4, z = 9.1. What are the values of the following expre
    7·1 answer
  • A
    12·1 answer
  • In the beginning of a presentation, it is important to:
    9·1 answer
  • Reasons for the growth of decision-making systems include:
    13·1 answer
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • i set up an account and paid the yearly fee, now it's asking me to join. i've tried to log in and brainly isn't accepting my ema
    8·1 answer
  • You load an image file into a numpy array and look at its shape, which is (433, 650). What does this indicate?
    13·1 answer
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • JUST MAXED OUT THE COMMENTS anyways come here
    7·2 answers
  • Enthusiasm codehs 7.6.4 Write a function called add_enthusiasm that takes a string and returns that string in all uppercase with
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!