COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
A stand-alone program that replicates, doing damage to a system
|
|
Malicious code that spreads from device to device but does not need to attach itself to a program in order to do so
|
|
A program that pretends to be safe, while actually containing malicious code
|
|
software that installs itself onto devices and then steals personal information about the user, like passwords,
|
Detailed explanation-1: -In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.
Detailed explanation-2: -Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs.
Detailed explanation-3: -A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you.
Detailed explanation-4: -Which of the following statements is true about the Trojans? Explanation: Trojans are a type of malware that will perform any types of actions for those they are design or programmed.
Detailed explanation-5: -Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.