FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Malware that pretends to be legitimate software such as security software or a game but acutally contains a virus is known as
A
Worm
B
Spyware
C
Trojan
D
None of the above
Explanation: 

Detailed explanation-1: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Detailed explanation-2: -A Virus is a malicious executable code attached to another executable file which can be harmless or can modify or delete data. Trojan Horse is a form of malware that captures some important information about a computer system or a computer network. Antivirus softwares are used for protection against viruses.

Detailed explanation-3: -Here is one example of how a Trojan horse might be used to infect a personal computer: The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment.

Detailed explanation-4: -A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes.

Detailed explanation-5: -A Trojan virus on a computer, or simply a Trojan, is a malicious software program or code masquerading as legitimate and harmless software. Once it infects a device, it executes its task, which may include deleting or modifying data, stealing data, installing additional malware, and disrupting system performance.

There is 1 question to complete.