arrow
arrow
arrow
Which among the following statements is incorrect?
Question

Which among the following statements is incorrect?

A.

Trojan looks like a legitimate software.

B.

Some Trojans create backdoors to give malicious users access to the system.

C.

Trojan self-replicate and infects other files.

D.

Trojans spreads through user interaction such as opening an email attachment or downloading and executing a file from the internet.

Correct option is C

The statement "Trojan self-replicate and infects other files" is incorrect because a Trojan Horse (Trojan) does not have the ability to self-replicate. Unlike worms or viruses, Trojans rely on user interaction to spread, such as opening an email attachment or downloading a malicious file.

Trojans disguise themselves as legitimate software and can perform harmful activities like stealing data, creating backdoors, or spying on users.

Important Key Points:

  1. Correct Statements about Trojans:
    • a) Trojan looks like a legitimate software:
      • Correct. Trojans often disguise themselves as trusted programs or utilities to deceive users.
    • b) Some Trojans create backdoors to give malicious users access to the system:
      • Correct. Many Trojans install backdoors that allow hackers to control the infected system.
    • d) Trojans spread through user interaction such as opening an email attachment or downloading and executing a file from the internet:
      • Correct. Trojans rely on social engineering and user actions to infiltrate systems.
  2. Why "C" is Incorrect:
    • Trojans do not self-replicate.
    • Self-replication is a characteristic of worms or viruses, not Trojans.

Knowledge Booster:

  1. Key Differences Between Malware Types:
    • Trojan: Does not self-replicate; relies on user action for installation.
    • Virus: Attaches to files and spreads when infected files are executed.
    • Worm: Self-replicates and spreads across networks without user action.
  2. Examples of Trojan Behavior:
    • Stealing sensitive information like login credentials.
    • Installing ransomware or spyware.
    • Using the infected system as part of a botnet.
  3. Interesting Fact:
    • The term "Trojan Horse" is inspired by the Greek myth where a deceptive gift (a wooden horse) was used to infiltrate and attack the city of Troy.

test-prime-package

Access ‘SSC CGL Tier 2’ Mock Tests with

  • 60000+ Mocks and Previous Year Papers
  • Unlimited Re-Attempts
  • Personalised Report Card
  • 500% Refund on Final Selection
  • Largest Community
students-icon
175k+ students have already unlocked exclusive benefits with Test Prime!

Free Tests

Free
Must Attempt

SSC MTS PYQ Vocab-1

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon30 Marks
  • timerIcon5 Mins
languageIcon English
Free
Must Attempt

SSC CGL PYQ Vocab-1

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon20 Marks
  • timerIcon5 Mins
languageIcon English
Free
Must Attempt

Idioms & Phrases PYQs -1

languageIcon English
  • pdpQsnIcon10 Questions
  • pdpsheetsIcon20 Marks
  • timerIcon5 Mins
languageIcon English