A malicious code that changes itself with each file it infects is called a: A. logic bomb. B. stealth virus. C. trojan horse. D. polymorphic virus.
Answer Posted / an
C. trojan horse.
Post New Answer View All Answers
purchase orders issued to vendors have been authorized as per the authorization matrix
1089
WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT
2839