Correct option is C
The statement "Trojan self-replicate and infects other files" is incorrect because a Trojan Horse (Trojan) does not have the ability to self-replicate. Unlike worms or viruses, Trojans rely on user interaction to spread, such as opening an email attachment or downloading a malicious file.
Trojans disguise themselves as legitimate software and can perform harmful activities like stealing data, creating backdoors, or spying on users.
Important Key Points:
- Correct Statements about Trojans:
- a) Trojan looks like a legitimate software:
- Correct. Trojans often disguise themselves as trusted programs or utilities to deceive users.
- b) Some Trojans create backdoors to give malicious users access to the system:
- Correct. Many Trojans install backdoors that allow hackers to control the infected system.
- d) Trojans spread through user interaction such as opening an email attachment or downloading and executing a file from the internet:
- Correct. Trojans rely on social engineering and user actions to infiltrate systems.
- Why "C" is Incorrect:
- Trojans do not self-replicate.
- Self-replication is a characteristic of worms or viruses, not Trojans.
Knowledge Booster:
- Key Differences Between Malware Types:
- Trojan: Does not self-replicate; relies on user action for installation.
- Virus: Attaches to files and spreads when infected files are executed.
- Worm: Self-replicates and spreads across networks without user action.
- Examples of Trojan Behavior:
- Stealing sensitive information like login credentials.
- Installing ransomware or spyware.
- Using the infected system as part of a botnet.
- Interesting Fact:
- The term "Trojan Horse" is inspired by the Greek myth where a deceptive gift (a wooden horse) was used to infiltrate and attack the city of Troy.