fbpx
Pin It

[1] What is the primary function of a Trojan horse?

a) To steal personal information

b) To destroy data

c) To spread malware

d) To gain unauthorized access to a system

[2] How is a Trojan horse typically delivered to a computer system?

a) Through a phishing email

b) Through a software update

c) Through a malicious website

d) Through a USB drive

[3] What type of Trojan horse is known as a "backdoor"?

a) One that steals personal information

b) One that destroys data

c) One that allows unauthorized access to a system

d) One that spreads malware

[4] What is the main difference between a virus and a Trojan horse?

a) A virus actively replicates itself, while a Trojan horse does not

b) A Trojan horse is a type of virus

c) A Trojan horse can only infect Windows systems, while a virus can infect any system

d) A Trojan horse is designed to steal personal information, while a virus is designed to destroy data

[5] What is a rootkit Trojan horse?

a) A Trojan horse that allows unauthorized access to a system

b) A Trojan horse that hides itself and other malware on a system

c) A Trojan horse that steals personal information

d) A Trojan horse that spreads malware

[6] How can a user protect their computer from a Trojan horse?

a) By only visiting trusted websites

b) By keeping their antivirus software up to date

c) By regularly updating their operating system

d) All of the above

[7] What is a RAT (Remote Access Trojan)?

a) A Trojan horse that allows unauthorized access to a system

b) A Trojan horse that hides itself and other malware on a system

c) A Trojan horse that steals personal information

d) A Trojan horse that spreads malware

[8] What is a banking Trojan?

a) A Trojan horse that steals personal information

b) A Trojan horse that destroys data

c) A Trojan horse that allows unauthorized access to a system

d) A Trojan horse that targets online banking information

[9] What is a keylogger Trojan horse?

a) A Trojan horse that records keystrokes on a system

b) A Trojan horse that steals personal information

c) A Trojan horse that allows unauthorized access to a system

d) A Trojan horse that spreads malware

[10] What is a DDoS (Distributed Denial of Service) Trojan horse?

a) A Trojan horse that allows unauthorized access to a system

b) A Trojan horse that steals personal information

c) A Trojan horse that overloads a website or network with traffic

d) A Trojan horse that spreads malware

Answers:

[1] d) To gain unauthorized access to a system

[2] a) Through a phishing email

[3] c) One that allows unauthorized access to a system

[4] a) A virus actively replicates itself, while a Trojan horse does not

[5] b) A Trojan horse that hides itself and other malware on a system

[6] d) All of the above

[7] a) A Trojan horse that allows unauthorized access to a system

[8] d) A Trojan horse that targets online banking information

[9] a) A Trojan horse that records keystrokes on a system

[10] c) A Trojan horse that overloads a website or network with traffic

Current Affairs

powered by Surfing Waves