COMPUTER ETHICS AND SECURITY
COMPUTER VIRUSES MALWARE AND HACKING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
This virus is similar to what was used to win a war
|
Worm
|
|
Trojan
|
|
DNS poisoning
|
|
greyware
|
Explanation:
Detailed explanation-1: -Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. Trojans also open a backdoor entry to your computer, giving command to malicious actor or allowing malicious users/programs access to your system. This leads to confidential and personal information being stolen.
Detailed explanation-2: -Like its namesake, Trojan horse attacks (or simply “Trojans”) in computing are defined as a type of malware that use deception and social engineering to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives.
There is 1 question to complete.