NETWORK MANAGEMENT
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Malicious software created to damage or gain illegal access to computer systems.
|
|
A type of malware that creates false messages to trick the user into following malicious links.
|
|
A type of malware which is disguised as legitimate software
|
|
A type of malware which secretly monitors and records user actions.
|
Detailed explanation-1: -A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users’ system access with their software.
Detailed explanation-2: -Trojan Horses are impostors-files that claim to be something desirable-but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojans contain malicious code that when triggered cause loss, or even theft, of data.
Detailed explanation-3: -Trojan horse is not a worm, so it cannot replicate itself Computer virus is a program, not a hardware and it is not a biological organism. So, among all the options only (C) is correct.