COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called:
A
Honeypot
B
Zombie
C
Logic bomb
D
Proxy
Explanation: 

Detailed explanation-1: -In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker.

Detailed explanation-2: -A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users’ system access with their software.

Detailed explanation-3: -A bot is a computer that has been infected with malware so it can be controlled remotely by a hacker. The bot – sometimes called a zombie computer – can then be used to launch more attacks or become part of a collection of bots called a botnet. Botnets can include millions of devices as they spread undetected.

Detailed explanation-4: -A Zombie is a malicious program that is installed on a device that transforms it into a “zombie” that attacks other systems. A computer or other device transformed by zombie malware is first infected by a virus or Trojan.

Detailed explanation-5: -Backdoor: A Backdoor is a type of Trojan that enables threat actors to gain remote access and control over a system.

There is 1 question to complete.