FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A COMPUTER VIRUS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
When a Trojan horse is activated it ____ existing desktop icons or ____ new ones.
A
changes, create
B
deletes, change
C
steals, changes
D
None of the above
Explanation: 

Detailed explanation-1: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Detailed explanation-2: -A common type of malware, a Trojan resembles a reputable, trusted application or file that convinces the user it is safe to download onto computers or laptops. When the user downloads and executes the malicious software onto a device, the malware contained within is activated.

Detailed explanation-3: -Trojan horse malware is a file, program, or piece of code that appears to be legitimate and safe, but is actually malware. Trojans are packaged and delivered inside legitimate software (hence their name), and they’re often designed to spy on victims or steal data.

Detailed explanation-4: -A Virus is a malicious executable code attached to another executable file which can be harmless or can modify or delete data. Trojan Horse is a form of malware that captures some important information about a computer system or a computer network. Antivirus softwares are used for protection against viruses.

There is 1 question to complete.