FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Why is a trojan horse sneaky?
A
It is very inviting
B
It creeps into your computer
C
It looks legitimate but really it isn’t
D
Because of the romans
Explanation: 

Detailed explanation-1: -Typically, the Trojan horse is hidden in an innocent-looking email attachment or free download. When the user clicks on the email attachment or downloads the free program, the malware hidden inside is transferred to the user’s computing device.

Detailed explanation-2: -A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

Detailed explanation-3: -If you’ve found yourself in this situation, or even thinking you are, there’s a real possibility you could have a Trojan virus on your computer. Trojan viruses can not only steal your most personal information, they also put you at risk for identity theft and other serious cybercrimes.

There is 1 question to complete.