COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
It is very inviting
|
|
It creeps into your computer
|
|
It looks legitimate but really it isn’t
|
|
Because of the romans
|
Detailed explanation-1: -Typically, the Trojan horse is hidden in an innocent-looking email attachment or free download. When the user clicks on the email attachment or downloads the free program, the malware hidden inside is transferred to the user’s computing device.
Detailed explanation-2: -A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Detailed explanation-3: -If you’ve found yourself in this situation, or even thinking you are, there’s a real possibility you could have a Trojan virus on your computer. Trojan viruses can not only steal your most personal information, they also put you at risk for identity theft and other serious cybercrimes.