Answer: d) Trojan horse attack
Explanation: A Trojan horse attack is a type of attack where malware disguises itself as a legitimate program to trick users into downloading and installing it. Once installed, the malware can perform a variety of malicious actions, such as stealing sensitive data or giving the attacker remote control of the system.