Which of the following statements best describes a Trojan?
A. Malicious software that hides into the lower levels of the operating system and opens a backdoor
B. Malicious software that records every key stroke and mouse movement
C. Malicious software that disguises itself as a legitimate program
D. Malicious software that takes the computer data hostage to extort money
Answer: C
Explanation: Trojans are malicious software that disguises themselves as legitimate programs. Ransomware is a type of malware that encrypts the data on a drive unless the owner pays a requested amount of money. A keylogger is malicious software that records every key stroke and mouse movement. A rootkit is malicious software that hides in the lower levels of the operating system with privileged access permissions and opens a backdoor on a system.
You might also like to view...
TLS makes use of a pseudorandom function referred to as __________ to expand secrets into blocks of data for purposes of key generation or validation.
Fill in the blank(s) with the appropriate word(s).
What is Oblique italic?
What will be an ideal response?
Which calculation uses the formula AV × EF?
A. SLE B. ARO C. ALE D. Cost-benefit analysis
Which of the following has the strongest level of encryption?
A. WEP B. WAP C. WPA D. WPA2