How do Trojan programs operate?

What will be an ideal response?


Trojans disguise themselves as useful programs and can install a backdoor or rootkit on a computer. Backdoors or rootkits are programs that give attackers a means of regaining access to the attacked computer later. A rootkit is created after an attack and usually hides itself in the OS tools, so it's almost impossible to detect.

Computer Science & Information Technology

You might also like to view...

Which of the following statements will assign a random number between 1 and 50 inclusive to intNum?

a. intNum = rand.Next(50) + 1 b. intNum = rand.Next(1, 50) c. intNum = rand.Next(50) d. intNum = rand.Next()

Computer Science & Information Technology

Which is an example of data you might store in an array?

A. Phone bills B. average temperatures C. grades D. All of the above

Computer Science & Information Technology

A ________ is a way to set up a secure wireless network to automatically configure devices to connect to a network

A) wide area network B) Wi-Fi Protected Setup C) TCP/IP protocol stack D) storage area network

Computer Science & Information Technology

Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price?

a. Shill bidding b. Bid shielding c. Bid siphoning d. None of the above

Computer Science & Information Technology