How do Trojan programs operate?
What will be an ideal response?
Trojans disguise themselves as useful programs and can install a backdoor or rootkit on a computer. Backdoors or rootkits are programs that give attackers a means of regaining access to the attacked computer later. A rootkit is created after an attack and usually hides itself in the OS tools, so it's almost impossible to detect.
Computer Science & Information Technology
You might also like to view...
Which of these items is not represented by a number?
A) a date B) a name C) an amount of money D) a time
Computer Science & Information Technology
Shape objects have a StrokeThickness property which defines the thickness of the outline. The default value for StrokeThickness is ________ pixel(s).
a) one b) two c) three d) five
Computer Science & Information Technology