COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

FIREWALLS AND ANTIVIRUS SOFTWARE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Malicious software that bypasses the normal, secure, or restricted access.
A
worm
B
backdoor
C
trojan horse
D
spyware
Explanation: 

Detailed explanation-1: -Trojan horse programs are malware that is disguised as legitimate software. A Trojan horse program will hide on your computer until it’s called upon. When activated, Trojans can allow threat actors to spy on you, steal your sensitive data, and gain backdoor access to your system.

Detailed explanation-2: -A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the malicious action.

Detailed explanation-3: -Usually, Trojan files remain hidden at this stage and once the permission is granted, Trojans are installed on the system and a backdoor is created. Using the back-door hackers/attackers became capable to gain admin-like access to the system and do whatever they want to do.

There is 1 question to complete.