How do Trojan programs operate?

What will be an ideal response?

Trojans disguise themselves as useful programs and can install a backdoor or rootkit on a computer. Backdoors or rootkits are programs that give attackers a means of regaining access to the attacked computer later. A rootkit is created after an attack and usually hides itself in the OS tools, so it's almost impossible to detect.

Computer Science & Information Technology

You might also like to view...

Which of these items is not represented by a number?

A) a date B) a name C) an amount of money D) a time

Computer Science & Information Technology

Shape objects have a StrokeThickness property which defines the thickness of the outline. The default value for StrokeThickness is ________ pixel(s).

a) one b) two c) three d) five

Computer Science & Information Technology