FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following best describes a Trojan Horse
A
Malicious software that misleads users of its intent, which is to allow unauthorised access to your system
B
Malicious software that replicates itself and spreads through your network to steal data
C
Malicious software that it usually attached to an email and sends itself around a network to allow unauthorised access to your system
D
Malicious software that sets your computer on fire
Explanation: 

Detailed explanation-1: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Detailed explanation-2: -That said, most Trojans are designed to take control of a user’s computer, steal data, spy on users, or insert more malware on to a victim’s computer.

Detailed explanation-3: -Rootkit. Rootkits are designed to conceal certain objects or activities in your system.

Detailed explanation-4: -The best description of Trojan horse malware, and what distinguishes it from viruses and worms, is that it appears as useful software but hides malicious code. Trojan horse malware may cause annoying computer problems, but can also cause fatal problems.

There is 1 question to complete.