[1] What is the primary function of a Trojan horse?
a) To steal personal information
b) To destroy data
c) To spread malware
d) To gain unauthorized access to a system
[2] How is a Trojan horse typically delivered to a computer system?
a) Through a phishing email
b) Through a software update
c) Through a malicious website
d) Through a USB drive
[3] What type of Trojan horse is known as a "backdoor"?
a) One that steals personal information
b) One that destroys data
c) One that allows unauthorized access to a system
d) One that spreads malware
[4] What is the main difference between a virus and a Trojan horse?
a) A virus actively replicates itself, while a Trojan horse does not
b) A Trojan horse is a type of virus
c) A Trojan horse can only infect Windows systems, while a virus can infect any system
d) A Trojan horse is designed to steal personal information, while a virus is designed to destroy data
[5] What is a rootkit Trojan horse?
a) A Trojan horse that allows unauthorized access to a system
b) A Trojan horse that hides itself and other malware on a system
c) A Trojan horse that steals personal information
d) A Trojan horse that spreads malware
[6] How can a user protect their computer from a Trojan horse?
a) By only visiting trusted websites
b) By keeping their antivirus software up to date
c) By regularly updating their operating system
d) All of the above
[7] What is a RAT (Remote Access Trojan)?
a) A Trojan horse that allows unauthorized access to a system
b) A Trojan horse that hides itself and other malware on a system
c) A Trojan horse that steals personal information
d) A Trojan horse that spreads malware
[8] What is a banking Trojan?
a) A Trojan horse that steals personal information
b) A Trojan horse that destroys data
c) A Trojan horse that allows unauthorized access to a system
d) A Trojan horse that targets online banking information
[9] What is a keylogger Trojan horse?
a) A Trojan horse that records keystrokes on a system
b) A Trojan horse that steals personal information
c) A Trojan horse that allows unauthorized access to a system
d) A Trojan horse that spreads malware
[10] What is a DDoS (Distributed Denial of Service) Trojan horse?
a) A Trojan horse that allows unauthorized access to a system
b) A Trojan horse that steals personal information
c) A Trojan horse that overloads a website or network with traffic
d) A Trojan horse that spreads malware
Answers:
[1] d) To gain unauthorized access to a system
[2] a) Through a phishing email
[3] c) One that allows unauthorized access to a system
[4] a) A virus actively replicates itself, while a Trojan horse does not
[5] b) A Trojan horse that hides itself and other malware on a system
[6] d) All of the above
[7] a) A Trojan horse that allows unauthorized access to a system
[8] d) A Trojan horse that targets online banking information
[9] a) A Trojan horse that records keystrokes on a system
[10] c) A Trojan horse that overloads a website or network with traffic