COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

COMPUTER VIRUSES MALWARE AND HACKING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This virus is similar to what was used to win a war
A
Worm
B
Trojan
C
DNS poisoning
D
greyware
Explanation: 

Detailed explanation-1: -Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. Trojans also open a backdoor entry to your computer, giving command to malicious actor or allowing malicious users/programs access to your system. This leads to confidential and personal information being stolen.

Detailed explanation-2: -Like its namesake, Trojan horse attacks (or simply “Trojans”) in computing are defined as a type of malware that use deception and social engineering to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives.

There is 1 question to complete.