Briefly describe Trojan horse malware and give an example.
What will be an ideal response?
A computer Trojan horse (or just Trojan) is an executable program that masquerades as performing a benign activity but also does something malicious. For example, a user may download what is advertised as a calendar program, yet when it is installed, in addition to installing the calendar it installs malware that scans the system for credit card numbers and passwords, connects through the network to a remote system, and then transmits that information to the attacker.
You might also like to view...
An advantage to using mail merge is that multiple documents, where only certain portions vary, can be created quickly
Indicate whether the statement is true or false
Blogger is part of the Google network of sites, so the Blogger site integrates nicely with Google's AdWords program
Indicate whether the statement is true or false