Briefly describe Trojan horse malware and give an example.

What will be an ideal response?


A computer Trojan horse (or just Trojan) is an executable program that masquerades as performing a benign activity but also does something malicious. For example, a user may download what is advertised as a calendar program, yet when it is installed, in addition to installing the calendar it installs malware that scans the system for credit card numbers and passwords, connects through the network to a remote system, and then transmits that information to the attacker.

Computer Science & Information Technology

You might also like to view...

Making the Node class a private inner class of a linked data structure is an example of:

a. polymorphism b. encapsulation c. inheritance d. all of the above

Computer Science & Information Technology

The only integer that can be assigned directly to a pointer is ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

__________ guarantees that when multiple messages are sent between processes, the messages will arrive in the order they were sent.

a) Atomic broadcast b) FIFO broadcast c) Totally ordered broadcast d) Causal broadcast

Computer Science & Information Technology

________ is the process of arranging data in a specific order based on the value in a field

A) Filtering B) Sorting C) Grouping D) Cascading

Computer Science & Information Technology