COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Disguised as legitimate software. Users install them without realising they have a hidden purpose.
A
Virus
B
Worm
C
Trojan
D
None of the above
Explanation: 

Detailed explanation-1: -Trojan horse programs are malware that is disguised as legitimate software. A Trojan horse program will hide on your computer until it’s called upon. When activated, Trojans can allow threat actors to spy on you, steal your sensitive data, and gain backdoor access to your system.

Detailed explanation-2: -RSA – Public encryption algorithm to protect the data over the internet. It is an asymmetric key encryption algorithm that uses public and private keys.

Detailed explanation-3: -The primary goal of network security is to prevent unauthorized access into or between parts of a network.

There is 1 question to complete.