Answer:
d) A computer game that creates a backdoor into your computer
Step-by-step explanation:
Trojan horse is a type of malware that is often disguised as legitimate software. They can be employed by cyber criminals and hackers to try to gain access to users' systems. In general, users are tricked by some form of social engineering to load and run Trojans on their systems. Once activated, Trojans allow criminals to spy on you, steal your confidential data and gain access to your system through the back door. An example of a Trojan horse is a computer game that creates a backdoor on your computer.
With a backdoor Trojan horse, malicious users remotely control the infected computer. With it, the author can do whatever he wants on the infected computer, such as sending, receiving, starting and deleting files, displaying data and restarting the computer. Backdoor Trojans are often used to assemble a set of computers and form a botnet or zombie network, which can be used for criminal purposes.