What functions do most Trojan programs perform?

What will be an ideal response?

Most Trojan programs perform one or more of the following functions:
- Allow remote administration of the attacked system
- Create a file server on the attacked computer so files can be loaded and downloaded without the user's knowledge
- Steal passwords from the attacked system and e-mail them to the attacker
- Log all keystrokes a user enters and e-mail the results to the attacker or store them in a hidden file the attacker can access remotely
- Encrypt all of the user's files and hold them ransom
- Destroy all of the data on a victim system

Computer Science & Information Technology

You might also like to view...

A(n) heat _____ is a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

CPU ________ are measurements used to compare performance between processors.

A. stats B. scores C. benchmarks D. records

Computer Science & Information Technology