Which of the following statements best describes a Trojan?

A. Malicious software that hides into the lower levels of the operating system and opens a backdoor
B. Malicious software that records every key stroke and mouse movement
C. Malicious software that disguises itself as a legitimate program
D. Malicious software that takes the computer data hostage to extort money

Answer: C
Explanation: Trojans are malicious software that disguises themselves as legitimate programs. Ransomware is a type of malware that encrypts the data on a drive unless the owner pays a requested amount of money. A keylogger is malicious software that records every key stroke and mouse movement. A rootkit is malicious software that hides in the lower levels of the operating system with privileged access permissions and opens a backdoor on a system.

Computer Science & Information Technology

You might also like to view...

What BSIMM practice improves the skills of the people most closely associated with the software lifecycle?

A. Strategy & Metrics B. Compliance & Policy C. Training D. Attack Models

Computer Science & Information Technology

Write an equation that properly models the problem below and solve the problem. In 2003, Gil de Ferran won the Indianapolis 500 with an average speed of 156.291 mph. Calculate the total time of the race.

A. 3 hr 15 min. 50 sec. B. 3 hr 10 min. 20 sec. C. 3 hr 15 min. 33 sec. D. 3 hr 11 min. 57 sec. E. 3 hr 12 min. 42 sec.

Computer Science & Information Technology