1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
8

Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a

malicious file b) A link in an email that downloads a virus c) An executable file that replicates throughout the network d) A computer game that creates a backdoor into your computer
Computers and Technology
2 answers:
vredina [299]3 years ago
4 0

Answer:

d) A computer game that creates a backdoor into your computer

Explanation:

Trojan horse is a type of malware that is often disguised as legitimate software. They can be employed by cyber criminals and hackers to try to gain access to users' systems. In general, users are tricked by some form of social engineering to load and run Trojans on their systems. Once activated, Trojans allow criminals to spy on you, steal your confidential data and gain access to your system through the back door. An example of a Trojan horse is a computer game that creates a backdoor on your computer.

With a backdoor Trojan horse, malicious users remotely control the infected computer. With it, the author can do whatever he wants on the infected computer, such as sending, receiving, starting and deleting files, displaying data and restarting the computer. Backdoor Trojans are often used to assemble a set of computers and form a botnet or zombie network, which can be used for criminal purposes.

sergij07 [2.7K]3 years ago
3 0

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

You might be interested in
What is required to display content on transparencies?
VladimirAG [237]
An overhead projector is required to display content on transparencies. A transparency is a thin sheet of plastic in which light is reflected upon to display content.The light source emits light towards the transparency and then the image is displayed on the wall. Usually, this light source comes from below and lights upward and so the content is depicted above or overhead.
6 0
3 years ago
- Truncate command response time is ______ as comparedto Delete command.
MArishka [77]

Answer:

c. Better

Explanation:

Truncate command response time is better as compared to Delete command.

8 0
3 years ago
What is the maximum number of characters that can be used in a Net BIOS name?
Paul [167]
The answer you’re looking for is 15
5 0
4 years ago
The ________ is the most important component in a computer because without it, the computer could not run software. Note: You ma
densk [106]

Answer:

Central processing unit (CPU)

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Hence, the most important component in a computer is the central processing unit (CPU) because without it, it is practically impossible for the computer to run any software application or program.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

8 0
3 years ago
someone can help plz " Provide definitions for the following terms: bit, byte, kilobyte (KB), megabyte (MB), gigabyte (GB), Tera
densk [106]

Answer:

Explanation:

Bit: A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1.

Byte: A byte is a data measurement unit that contains eight bits, or a series of eight zeros and ones.

Kilobyte: A KB (kilobyte) is 1000 bytes.

Megatype: An MB (megabyte) is 1000 kilobytes.

Gigatype: A GB (gigabyte) is 1000 megabytes.

Terabyte: A TB (terabyte) is 1000 gigabytes.

hope this helped you!

4 0
3 years ago
Other questions:
  • What is the cheapest type of printer to buy and run?
    11·2 answers
  • Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu
    13·1 answer
  • PLEASE HELP ASAP i will mark brilliant
    12·2 answers
  • Kindly answer in Just 7,8 lines please
    7·1 answer
  • When you first launch the internet, what page will open?
    9·1 answer
  • The Go To feature can be accessed from which of the following dialog boxes?
    10·1 answer
  • Is phone data used when connected to wifi
    12·1 answer
  • 3. Maria is in charge of consolidating the names of the participants of the two-day virtual
    13·1 answer
  • True or False? Threat modeling is the practice of identifying and prioritizing potential threats and security mitigations to pro
    9·1 answer
  • Assume the data link protocol used by NDAS has the following associated characteristics:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!