COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
A stand-alone program that replicates, doing damage to a system
|
|
Malicious code that spreads from device to device but does not need to attach itself to a program in order to do so
|
|
A program that pretends to be safe, while actually containing malicious code
|
|
software that installs itself onto devices and then steals personal information about the user, like passwords,
|
Detailed explanation-1: -Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs.
Detailed explanation-2: -What Is a Trojan Horse Virus? A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users’ system access with their software.
Detailed explanation-3: -A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you.
Detailed explanation-4: -Definition(s): A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.