1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
8

Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a

malicious file b) A link in an email that downloads a virus c) An executable file that replicates throughout the network d) A computer game that creates a backdoor into your computer
Computers and Technology
2 answers:
vredina [299]3 years ago
4 0

Answer:

d) A computer game that creates a backdoor into your computer

Explanation:

Trojan horse is a type of malware that is often disguised as legitimate software. They can be employed by cyber criminals and hackers to try to gain access to users' systems. In general, users are tricked by some form of social engineering to load and run Trojans on their systems. Once activated, Trojans allow criminals to spy on you, steal your confidential data and gain access to your system through the back door. An example of a Trojan horse is a computer game that creates a backdoor on your computer.

With a backdoor Trojan horse, malicious users remotely control the infected computer. With it, the author can do whatever he wants on the infected computer, such as sending, receiving, starting and deleting files, displaying data and restarting the computer. Backdoor Trojans are often used to assemble a set of computers and form a botnet or zombie network, which can be used for criminal purposes.

sergij07 [2.7K]3 years ago
3 0

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

You might be interested in
Kyle wants to access his school’s home page. How can he do this?
Vedmedyk [2.9K]

First, he needs to have a computer that is connected to the internet, then secondly kyle needs to know the URL/website of his school, thirdly, he needs to enter the URL into the browser on his computer, this takes him straight to his schools' Homepage.

6 0
3 years ago
Read 2 more answers
Readability is the level of vocabulary used on the page. True or false
konstantin123 [22]

Answer:

FALSE....john has no idea what hes talking about. i knew this was false yet i looked it up and got it wrong anyway because of john its freaking false

Explanation:

8 0
3 years ago
Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
gayaneshka [121]

Answer:

A. Define boundaries

C. Deny access

D. Delay access

Explanation:

A barrier is a material or structure used to prevent or block access. Barriers can either be natural or structural and are used for many purposes usually for security reasons. The following are functions of barriers either natural or structural:

  1. Define areas of boundaries
  2. Delay or slow access. Example is the use of speed bumps to slow down vehicles.
  3. Provide access to entrances such as the use of gates
  4. Deny access to unauthorized personnel and allowing authorized personnel.
4 0
3 years ago
Approximately what percentage of the world population owns a smartphone?
Usimov [2.4K]
The number of smartphone users is forcast to grow from 2.1 billion in 2016 to around 2.5 billion in 2019, with smartphone penetration rates increasing as well.over 36% of the worlds population is projected to use a smartphone by 2018, thats up from about 10% in 2011
5 0
3 years ago
Do the police check your mobile device during police checks?
Marat540 [252]
it depends............

4 0
3 years ago
Read 2 more answers
Other questions:
  • What privacy issues have arisen with webcams in mobile devices?
    8·1 answer
  • When was unicode invented?
    13·1 answer
  • Which version of Windows was considered an operating environment rather than an operating system? Windows 1.0 Windows 3.0 Window
    9·1 answer
  • _ models are non visual ways of communicating how someone thinks about something in the natural world
    12·1 answer
  • Random number between 0 and 5 (inclusive)
    10·2 answers
  • How to cancel branly subscription??​
    8·1 answer
  • What is the model for 2017 Ford Mustang v6
    15·1 answer
  • Q1 To remove filter
    15·2 answers
  • Which of the following is considered true regarding modern work environments?
    9·1 answer
  • How to do or create a shepard tone using additive synthesis in Pure Data. Please help, desperate!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!