What functions do most Trojan programs perform?
What will be an ideal response?
Most Trojan programs perform one or more of the following functions:
- Allow remote administration of the attacked system
- Create a file server on the attacked computer so files can be loaded and downloaded without the user's knowledge
- Steal passwords from the attacked system and e-mail them to the attacker
- Log all keystrokes a user enters and e-mail the results to the attacker or store them in a hidden file the attacker can access remotely
- Encrypt all of the user's files and hold them ransom
- Destroy all of the data on a victim system
You might also like to view...
A Java collection
A) is a class that is defined in the java.awt package B) is an abstract class in the java.collect package C) is an object that is used as a container for other objects D) None of the above
Choose servers for your SQL Server installation that use a(n) ____ file system.
A. FAT B. NTFS C. SSH D. SSL
The getElementsByTagName() method will return a single element if there is only one such element defined on the page.
Answer the following statement true (T) or false (F)
A data type provides both a set of values and a set of operations that can be applied to these values.
Answer the following statement true (T) or false (F)