An unauthorized program typically contained within a legitimate program is known as a:
a. worm.
b. macro.
c. Trojan.
d. Sparta.
Question 2
_______________________ is the lead agency responsible for monitoring and protecting all of the federal government's computer networks from acts of cyberterrorism.
Fill in the blank(s) with correct word