__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
A . Trojan
B . Operating System
C . Virus
D . Malware
Answer: D
Latest ISO-IEC-27001 Lead Auditor Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund