FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____ programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.
A
Zombie
B
Worm
C
Trojan Horses
D
Logic Bomb
Explanation: 

Detailed explanation-1: -Trojan horse programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. For example, a user of a multi-user system who wishes to gain access to other users’ files could create a Trojan horse program to circumvent the users’ file security mechanisms.

Detailed explanation-2: -The correct answer is option 3, i.e. Trojan Horses.

Detailed explanation-3: -Trojan backdoor: It is a popular type of Trojan. This type of Trojan Horse virus allows hackers to remotely access and control a computer, often for the purpose of uploading, downloading, or executing files at will.

Detailed explanation-4: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Detailed explanation-5: -Among the options cookies is not a malware.

There is 1 question to complete.