FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What type of software is used to circumvent normal security processes on a computer?
A
Backdoor
B
Trojan horse
C
spyware
D
phage virus
Explanation: 

Detailed explanation-1: -What type of software is used to circumvent normal security processes on a computer? A. A backdoor is an attempt to avoid normal security mechanisms. A backdoor can be assimple as using the default password if it wasn’t changed, or it can be a malware program.

Detailed explanation-2: -Antivirus software protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account. Antivirus protection scans your files and your incoming email for viruses, and then deletes anything malicious.

Detailed explanation-3: -Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes. Trojans may hide in games, apps, or even software patches, or they may be embedded in attachments included in phishing emails.

Detailed explanation-4: -A virus is malware that attaches to another program and, when executed-usually inadvertently by the user-replicates itself by modifying other computer programs and infecting them with its own bits of code. Worms are a type of malware similar to viruses. Like viruses, worms are self-replicating.

Detailed explanation-5: -Since they can spread fast, worms are often used to execute a payload-a piece of code created to damage a system. Payloads can delete files on a host system, encrypt data for a ransomware attack, steal information, delete files, and create botnets.

There is 1 question to complete.