FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
what is the name of an file that appears to look like a helpful application, or free download, but instead contains additional code that does harm to your computer?
A
virus
B
worm
C
malware
D
Trojan horse
Explanation: 

Detailed explanation-1: -A Trojan horse is designed to appear as a legitimate software program to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.

Detailed explanation-2: -Trojan Spyware Alert Scams The most common is a popup technical support window that tricks unsuspecting visitors into believing their device is already infected with a Trojan virus or spyware. It then prompts them to click a link or call a number.

Detailed explanation-3: -DDoS Attack Trojan (Botnet) The attacker’s objective is to harvest as many machines as possible and use them for malicious purposes without the knowledge of the device owners-typically to flood servers with fake traffic as part of a Distributed Denial of Service (DoS) attack.

Detailed explanation-4: -A RAT (remote access Trojan) is malware an attacker uses to gain full administrative privileges and remote control of a target computer. RATs are often downloaded along with seemingly legitimate user-requested programs–such as video games–or are sent to their target as an email attachment via a phishing email.

Detailed explanation-5: -Here is one example of how a Trojan horse might be used to infect a personal computer: The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment.

There is 1 question to complete.