A mobile user calls you from the road and informs you that his laptop is exhibiting erratic behavior. He reports that there were no problems until he downloaded a tic-tac-toe program from a site that he had never visited before. Which of the following terms describes a program that enters a system disguised in another program?
a. Trojan horse virus
b. Polymorphic virus
c. Worm
d. Armored virus
Answer: A
A Trojan horse enters with a legitimate program to accomplish its nefarious deeds.