FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is the most accurate definition of a Trojan?
A
A stand-alone program that replicates, doing damage to a system
B
Malicious code that spreads from device to device but does not need to attach itself to a program in order to do so
C
A program that pretends to be safe, while actually containing malicious code
D
software that installs itself onto devices and then steals personal information about the user, like passwords,
Explanation: 

Detailed explanation-1: -In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.

Detailed explanation-2: -Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs.

Detailed explanation-3: -A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you.

Detailed explanation-4: -Which of the following statements is true about the Trojans? Explanation: Trojans are a type of malware that will perform any types of actions for those they are design or programmed.

Detailed explanation-5: -Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.

There is 1 question to complete.