COMPUTER NETWORKING

MULTIMEDIA AND QUALITY OF SERVICE

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An attack method using malicious code by inserting viruses, worms or trojan horses is a logical attack called ____
A
SQL Injection
B
Request Flooding
C
Social Engineering
D
Malicious Code
E
Packet Sniffer
Explanation: 

Detailed explanation-1: -"Malware” is short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand-alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.

Detailed explanation-2: -E-mail with the aim of stealing passwords from a victim’s computer and then e-mailing the stolen data to a targeted recipient often distributes one of the most common types of Trojan horse.

There is 1 question to complete.