Briefly describe Trojan horse malware and give an example.
What will be an ideal response?
A computer Trojan horse (or just Trojan) is an executable program that masquerades as performing a benign activity but also does something malicious. For example, a user may download what is advertised as a calendar program, yet when it is installed, in addition to installing the calendar it installs malware that scans the system for credit card numbers and passwords, connects through the network to a remote system, and then transmits that information to the attacker.
You might also like to view...
Making the Node class a private inner class of a linked data structure is an example of:
a. polymorphism b. encapsulation c. inheritance d. all of the above
The only integer that can be assigned directly to a pointer is ______.
Fill in the blank(s) with the appropriate word(s).
__________ guarantees that when multiple messages are sent between processes, the messages will arrive in the order they were sent.
a) Atomic broadcast b) FIFO broadcast c) Totally ordered broadcast d) Causal broadcast
________ is the process of arranging data in a specific order based on the value in a field
A) Filtering B) Sorting C) Grouping D) Cascading