What functions do most Trojan programs perform?
What will be an ideal response?
Most Trojan programs perform one or more of the following functions:
- Allow remote administration of the attacked system
- Create a file server on the attacked computer so files can be loaded and downloaded without the user's knowledge
- Steal passwords from the attacked system and e-mail them to the attacker
- Log all keystrokes a user enters and e-mail the results to the attacker or store them in a hidden file the attacker can access remotely
- Encrypt all of the user's files and hold them ransom
- Destroy all of the data on a victim system
You might also like to view...
A(n) heat _____ is a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor.
Fill in the blank(s) with the appropriate word(s).
CPU ________ are measurements used to compare performance between processors.
A. stats B. scores C. benchmarks D. records