FUNDAMENTALS OF COMPUTER

TECHNOLOGYS ETHICAL LEGAL PRIVACY ISSUES

INFORMATION PRIVACY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
How are worms different from Trojan horses?
A
Worms enter a device via an email attachment
B
Worms can spread on their own
C
Worms hide from the user
D
Worms delete files
Explanation: 

Detailed explanation-1: -A Worm is like a Computer Virus by its design but is a sub-class of a Virus or Trojan Horse. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without attaching to a host program and can run independently.

Detailed explanation-2: -Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

Detailed explanation-3: -Once a worm has entered your system, usually via a network connection or as a downloaded file, it can then run, self-replicate and propagate without a triggering event. A worm makes multiple copies of itself which then spread across the network or through an internet connection.

Detailed explanation-4: -A Virus is a malicious executable code attached to another executable file which can be harmless or can modify or delete data. Trojan Horse is a form of malware that captures some important information about a computer system or a computer network. Antivirus softwares are used for protection against viruses.

Detailed explanation-5: -Trojan Horses are impostors-files that claim to be something desirable-but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojans contain malicious code that when triggered cause loss, or even theft, of data.

There is 1 question to complete.