A Trojan horse: installs spyware on users' computers.
a. is malware named for a breed of fast-moving Near-Eastern horses.
b. is software that appears to be benign but does something other than expected.
c. is a type of sniffer used to infiltrate corporate networks.
d. is a virus that replicates quickly.
b. A Trojan horse is a software that appears to be benign but does something other than expected.
Explanation:
A Trojan horse is not a virus because it does not replicate itself but this is a software that can act as dangerous as the virus does in damaging a computer.
It appears to be harmless but when such a software is installed into the computer it affects other files resulting in damaging the computer and making the system to crash.
It can make way for other malware to enter a computer and can slow down the activities of a computer and can make hackers control the computer remotely.
Trojan horse can be installed into the computer clicking on an email attachment or a link in the email which might install a malicious software on the computer, or downloading an application or software that seem harmless but can affect the computer.