The correct choice is (d) Securing systems with such programs
The best I can explain: Trojan creators do not look for securing victim’s system with their programs, rather they create such trojans for stealing credit card and financial details as well as important documents and files.