Which of the following statements best describes a Trojan?

A. Malicious software that hides into the lower levels of the operating system and opens a backdoor
B. Malicious software that records every key stroke and mouse movement
C. Malicious software that disguises itself as a legitimate program
D. Malicious software that takes the computer data hostage to extort money


Answer: C
Explanation: Trojans are malicious software that disguises themselves as legitimate programs. Ransomware is a type of malware that encrypts the data on a drive unless the owner pays a requested amount of money. A keylogger is malicious software that records every key stroke and mouse movement. A rootkit is malicious software that hides in the lower levels of the operating system with privileged access permissions and opens a backdoor on a system.

Computer Science & Information Technology

You might also like to view...

TLS makes use of a pseudorandom function referred to as __________ to expand secrets into blocks of data for purposes of key generation or validation.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is Oblique italic?

What will be an ideal response?

Computer Science & Information Technology

Which calculation uses the formula AV × EF?

A. SLE B. ARO C. ALE D. Cost-benefit analysis

Computer Science & Information Technology

Which of the following has the strongest level of encryption?

A. WEP B. WAP C. WPA D. WPA2

Computer Science & Information Technology