COMPUTER NETWORKING

NETWORK MANAGEMENT

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What type of malware disguises itself as software that you would like to install?
A
Ransomware
B
Trojan Horse
C
Worm
D
Whack-a-mole
Explanation: 

Detailed explanation-1: -Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes. Trojans may hide in games, apps, or even software patches, or they may be embedded in attachments included in phishing emails.

Detailed explanation-2: -Trojan viruses are a type of malware that invade your computer disguised as real, operational programs. Once a trojan is inside your system, it can perform destructive actions before you even know it’s there.

Detailed explanation-3: -Here is one example of how a Trojan horse might be used to infect a personal computer: The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment.

Detailed explanation-4: -Downloader Trojan. A downloader trojan downloads and deploy other malicious code, such as rootkits, ransomware or keyloggers. Backdoor Trojan. Spyware. Rootkit Trojans. DDoS Attack Trojan (Botnet) Zeus. ILOVEYOU. Cryptolocker. More items

There is 1 question to complete.