FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A trojan is an example of
A
a social engineering technique
B
malicious code
C
misconfigured access rights
D
removable media
Explanation: 

Detailed explanation-1: -Trojans are decoy files that carry malicious code payloads, requiring a user to use the file or program to execute. These threats cannot self-replicate or spread autonomously. However, their malicious payload could contain viruses, worms, or any other code.

Detailed explanation-2: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Detailed explanation-3: -Taking advantage of common system vulnerabilities, malicious code examples include computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programs. Visiting infected websites or clicking on a bad email link or attachment are ways for malicious code to sneak its way into a system.

Detailed explanation-4: -Trojans are malicious code or software that infiltrate a computer while impersonating a genuine program and eventually take over the system without the user or IT administrator noticing. Technically, Trojans are not viruses – instead, they are a sort of malware.

Detailed explanation-5: -Spyware is software that observes user activities, collecting sensitive data like account credentials or banking details. They send this data back to the attacker. Spyware is typically disguised as useful software, so it is generally considered as a type of trojan.

There is 1 question to complete.