SOFTWARE ENGINEERING

SOFTWARE ENGINEERING ETHICS AND PROFESSIONAL PRACTICES

SOFTWARE LICENSING AND INTELLECTUAL PROPERTY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
If a user runs a software that he thought was useful but turned out to be malicious, that malware is called a “ ____ “.
A
trojan horse
B
logic bomb
C
phish
D
brute force
Explanation: 

Detailed explanation-1: -A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.

Detailed explanation-2: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Detailed explanation-3: -Zeus Gameover-a peer-to-peer version of the Zeus botnet without a centralized C&C. SpyEye-designed to steal money from online bank accounts. Ice IX-financial malware that can control content in a browser during a financial transaction, and extract credentials and private data from forms. More items

There is 1 question to complete.