FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Trojan Horses
A
Does not need to attach to a program
B
Can only occur when a computer is not connected to a network
C
A type of social engineering
D
Designed to access a computer by misleading users of its’ intent by prompting to download a program
Explanation: 

Detailed explanation-1: -5. Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes.

Detailed explanation-2: -Data Protection Act 2018 Section 170: Creates an offence of the deliberate or reckless obtaining, disclosing, procuring and retention of personal data without the consent of the data controller.

Detailed explanation-3: -A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code. A program that is written intentionally to carry out annoying or harmful actions, which includes Trojan horses, viruses, and worms.

Detailed explanation-4: -Explanation: Trojans do not replicate or reproduce through infection. “Trojan” alludes to the mythological story of Greek soldiers hidden inside a wooden horse that was given to the enemy city of Troy.

There is 1 question to complete.