What is a Trojan, and how is it installed?

What will be an ideal response?


A Trojan does not need a host program to work; rather, it substitutes itself for a legitimate program. In most cases, a user launches it thinking she is launching a legitimate program. A Trojan is often embedded in the files of legitimate software that is downloaded from an untrustworthy website, or a user is tricked into opening an email attachment.

Computer Science & Information Technology

You might also like to view...

What is the preferred method to configure clients to use Work Folders?

A. configure user object in Active Directory B. automatic discovery C. manually enter the Work Folders URL D. configure through the System and Security applet

Computer Science & Information Technology

If you had to write a function that asked for and returned two ints, which function would NOT work?

A. int Ask(int n); B. int Ask(int *n); C. void Ask(int *n, int &m); D. void Ask(int &n, int &m);

Computer Science & Information Technology

Data from two or more tables can be connected by specifying a:

A) form. B) common field. C) hyperlink. D) field value.

Computer Science & Information Technology

Match the following e-payment methods with their descriptions

6. Limited purpose cards a. Their value is stored electronically on the device via an integrated circuit chip. 7. Stored value cards b. They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user. 8. Internet payment services c. They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company. 9. Prepaid cards d. They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account. 10. Open system cards e. They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.

Computer Science & Information Technology