hamburger menu
All Coursesall course arrow
adda247
reward-icon
adda247
    arrow
    arrow
    arrow
    In computing, which of the following is a program downloaded and installed on a computer that appears harmless but is, in fact, malicious?
    Question



    In computing, which of the following is a program downloaded and installed on a computer that appears harmless but is, in fact, malicious?

    A.

    Trojan Horse

    B.

    Time Bomb

    C.

    Worm

    D.

    Logic Bomb

    Correct option is A

    A Trojan Horse is a type of malware that appears to be a legitimate program or file, but once installed, it performs malicious activities without the user’s knowledge.
    · A Trojan disguises itself as a harmless application, such as a game or utility tool.
    · When downloaded and executed, it can steal data, grant unauthorized access to hackers, or damage files on the system.
    Information Booster:
    1. Trojan Horse:
    · Named after the legendary Greek story, a Trojan Horse appears benign but contains malicious code.
    · It relies on users willingly downloading or installing the software, often masquerading as useful tools or files.
    · Unlike worms, it requires manual execution by the user to become active.
    2. Common Effects:
    · Data Theft: Stealing sensitive information like login credentials or financial data.
    · System Compromise: Granting attackers remote access to the system.
    · Spreading Malware: Serving as a host to install other malicious software.
    3. Example: Fake antivirus software that alerts the user to fake threats and then steals personal data when installed.
    Additional Knowledge:
    · Time Bomb: A type of malware programmed to execute its payload at a specific time or date. Does not disguise itself as a harmless program.
    · Worm: A self-replicating program that spreads across networks without needing to be disguised as a harmless program. Worms exploit vulnerabilities in network systems.
    · Logic Bomb: A malicious program that activates when specific conditions are met (e.g., a certain file is opened or a program is executed). It is not disguised as a harmless program.

    Free Tests

    Free
    Must Attempt

    Basics of Education: Pedagogy, Andragogy, and Hutagogy

    languageIcon English
    • pdpQsnIcon10 Questions
    • pdpsheetsIcon20 Marks
    • timerIcon12 Mins
    languageIcon English
    Free
    Must Attempt

    UGC NET Paper 1 Mock Test 1

    languageIcon English
    • pdpQsnIcon50 Questions
    • pdpsheetsIcon100 Marks
    • timerIcon60 Mins
    languageIcon English
    Free
    Must Attempt

    Basics of Education: Pedagogy, Andragogy, and Hutagogy

    languageIcon English
    • pdpQsnIcon10 Questions
    • pdpsheetsIcon20 Marks
    • timerIcon12 Mins
    languageIcon English

    Similar Questions

    test-prime-package

    Access ‘UGC NET December’ Mock Tests with

    • 60000+ Mocks and Previous Year Papers
    • Unlimited Re-Attempts
    • Personalised Report Card
    • 500% Refund on Final Selection
    • Largest Community
    students-icon
    354k+ students have already unlocked exclusive benefits with Test Prime!
    Our Plans
    Monthsup-arrow