and Other Attacks | Latest Version |
2024/2025 | Rated A+
What is a Trojan horse?
A) A type of computer virus
B) A legitimate program that contains malicious code
C) A tool for network scanning
D) A type of firewall
✔✔ B) A legitimate program that contains malicious code
Which of the following is a characteristic of a Trojan?
A) It replicates itself to spread
B) It requires user interaction to install
C) It automatically removes itself after execution
D) It encrypts files without notice
✔✔ B) It requires user interaction to install
What type of attack does a Trojan horse typically facilitate?
1
,A) Direct network attacks
B) Phishing attacks
C) Data theft
D) DoS attacks
✔✔ C) Data theft
What is a common method for distributing Trojans?
A) Through email attachments
B) By physical access to devices
C) On removable media
D) All of the above
✔✔ D) All of the above
Which of the following is an example of a remote access Trojan (RAT)?
A) Keylogger
B) Backdoor
C) DDoS tool
D) Worm
2
, ✔✔ B) Backdoor
What is the primary goal of a backdoor Trojan?
A) To steal passwords
B) To provide unauthorized access to the system
C) To encrypt files
D) To monitor network traffic
✔✔ B) To provide unauthorized access to the system
Which technique is often used by Trojans to evade detection?
A) Encryption
B) Regular updates
C) Low resource consumption
D) User prompts
✔✔ A) Encryption
What is a keylogger?
A) A type of Trojan that captures keystrokes
3