1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
3 years ago
11

What type of malicious computer programs present themselves as useful computer programs or applications?

Computers and Technology
2 answers:
Vedmedyk [2.9K]3 years ago
8 0

Answer:

Trojan

Explanation:

A Trojan is a malicious program that misrepresents itself to appear useful. Cybercriminals deliver Trojans in the guise of routine software that persuades a victim to install it on their computer. The term is derived from the Ancient Greek story of the wooden horse used to invade the city of Troy by stealth.

erastova [34]3 years ago
5 0

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

You might be interested in
The physical components of a computer are called what?
Natalka [10]

Answer:

the hardware components.

Explanation:

the hardware components are the physical parts of the computer which can be seen and touched.

3 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
4 years ago
What is used in an ipv6 for local device to learn the layer 2 ethernet address of a device that is on a remote nonlocal vlan?
zavuch27 [327]
The devices in IPv6 only need to learn the Layer 2 Ethernet address of a neighbor that is directly connected, and only if they need to communicate with each other on that local network. If the device you are trying to connect to is remote, you will forward the packet to your default gateway’s Layer 2 address.
NDP (Neighbor Discovery Protocol) is used to learn local neighbors’ Layer 2 Ethernet addresses when needed.
ARP is an IPv4 method to learn a local device’s Layer 2 address.
The RIPng (RIP next generation) is RIP version that support of IPv6 networking..
3 0
4 years ago
Why would "ExpirationDate” be a poor choice as a primary key?
denis23 [38]
<span>There could be more than one item with the same expiration date, and primary keys must be unique.</span>
4 0
4 years ago
Who could help me with this
mixas84 [53]
No. Don’t be lazy and do it yourself unless you don’t know
7 0
3 years ago
Other questions:
  • Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is ab
    9·1 answer
  • Write a statement that compares the values of score1 and score2 and takes the following actions. When score1 exceeds score2, the
    7·1 answer
  • What is the most common password on the internet?
    11·2 answers
  • Distancelearning has got a boost due to the ___________.
    5·1 answer
  • What is a header row?
    8·1 answer
  • 1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative va
    11·1 answer
  • Write three statements to print the first three elements of vector runTimes. Follow each with a newline. Ex: If runTimes = {800,
    8·1 answer
  • The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Wel
    12·1 answer
  • While shopping online, Tucker visits a website that looks outdated and has limited reviews. Which of the following strategies sh
    11·1 answer
  • It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring ca
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!