A trojan horse
a. is malware named for a breed of fast- moving near- eastern horses.
b. is a type of sniffer used to infiltrate corporate networks.
c. is software that appears to be benign but does something other than expected.
d. installs spyware on users? computers.
e. is a virus that replicates quickly.