Trojan horses may disclose sensitive information of victims or even remotely manipulate victims' hosts, causing serious harm. Which of the following are the transmission modes of Trojan horses?(Select All that Apply)
A.
Attackers exploit vulnerabilities to break into hosts and install Trojan horses.
B.
A Trojan horse is bundled in a well-known tool program.
C.
The software downloaded from a third-party downloader carries Trojan horses.
D.
A Trojan horse masquerades as a tool program to deceive users to run the program on a host. Once the program is run, the Trojan horse is automatically implanted into the host.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit