header bg

Question:

Which of the following types of malware is Heather using if she wants to gain remote access to Randy's machine and has developed a program and hidden it inside a legitimate program that she is sure Randy will configure on his machine?

A Trojan horse
Explaination