COMPUTER THREATS SECURITY
WHAT IS A COMPUTER VIRUS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
is easy to detect because the virus has suspicious symptoms
|
|
has symptoms that are similar to viruses in humans
|
|
has the ability to multiply quickly into copies of itself
|
|
is difficult to detect because it replicates itself as a safe computer program
|
Detailed explanation-1: -Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.
Detailed explanation-2: -Since Trojans often imitate legitimate system files, they are very difficult to find and eliminate using conventional virus scanners. But if a Trojan is not found, it can cause considerable damage to the operating system and the people and companies behind it.
Detailed explanation-3: -Since Trojan horses frequently appear disguised as legitimate system files, they are often very hard to find and destroy with conventional virus and malware scanners. Specialized software tools are often necessary for the identification and removal of discrete Trojan horses.
Detailed explanation-4: -Trojan viruses can not only steal your most personal information, they also put you at risk for identity theft and other serious cybercrimes.
Detailed explanation-5: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.