How do Trojan programs operate?
What will be an ideal response?
Trojans disguise themselves as useful programs and can install a backdoor or rootkit on a computer. Backdoors or rootkits are programs that give attackers a means of regaining access to the attacked computer later. A rootkit is created after an attack and usually hides itself in the OS tools, so it's almost impossible to detect.
You might also like to view...
Which of the following statements will assign a random number between 1 and 50 inclusive to intNum?
a. intNum = rand.Next(50) + 1 b. intNum = rand.Next(1, 50) c. intNum = rand.Next(50) d. intNum = rand.Next()
Which is an example of data you might store in an array?
A. Phone bills B. average temperatures C. grades D. All of the above
A ________ is a way to set up a secure wireless network to automatically configure devices to connect to a network
A) wide area network B) Wi-Fi Protected Setup C) TCP/IP protocol stack D) storage area network
Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price?
a. Shill bidding b. Bid shielding c. Bid siphoning d. None of the above