Correct option is C
The correct answer is (C) Trojan
Explanation:
● A Trojan is a type of malware that disguises itself as a useful or legitimate application.
● Once installed, it secretly performs malicious activities such as stealing data or damaging the system.
● Trojans do not replicate themselves; they rely on users to install them unknowingly.
● A Trojan is a type of malware that disguises itself as a useful or legitimate application.
● Once installed, it secretly performs malicious activities such as stealing data or damaging the system.
● Trojans do not replicate themselves; they rely on users to install them unknowingly.
Information Booster:
● Trojans are often spread through fake apps, email attachments, or unsafe downloads.
● They can create backdoors, allowing hackers to control the infected system remotely.
● Trojans are commonly used for data theft, spying, and system manipulation.
● Antivirus software helps detect and remove Trojan malware.
● Trojans are one of the most common cyber threats.
● Trojans are often spread through fake apps, email attachments, or unsafe downloads.
● They can create backdoors, allowing hackers to control the infected system remotely.
● Trojans are commonly used for data theft, spying, and system manipulation.
● Antivirus software helps detect and remove Trojan malware.
● Trojans are one of the most common cyber threats.
Additional Knowledge:
● Virus malware can self-replicate and spread to other files or systems.
● Spam refers to unwanted or unsolicited messages, not malware itself.
● Phishing involves tricking users into revealing sensitive information through fake websites or emails.
● Virus malware can self-replicate and spread to other files or systems.
● Spam refers to unwanted or unsolicited messages, not malware itself.
● Phishing involves tricking users into revealing sensitive information through fake websites or emails.