hamburger menu
All Coursesall course arrow
adda247
reward-icon
adda247
    arrow
    arrow
    arrow
    Which among the following statements is incorrect?
    Question

    Which among the following statements is incorrect?

    A.

    Trojan looks like a legitimate software.

    B.

    Some Trojans create backdoors to give malicious users access to the system.

    C.

    Trojan self-replicate and infects other files.

    D.

    Trojans spreads through user interaction such as opening an email attachment or downloading and executing a file from the internet.

    Correct option is C

    The statement "Trojan self-replicate and infects other files" is incorrect because a Trojan Horse (Trojan) does not have the ability to self-replicate. Unlike worms or viruses, Trojans rely on user interaction to spread, such as opening an email attachment or downloading a malicious file.

    Trojans disguise themselves as legitimate software and can perform harmful activities like stealing data, creating backdoors, or spying on users.

    Important Key Points:

    1. Correct Statements about Trojans:
      • a) Trojan looks like a legitimate software:
        • Correct. Trojans often disguise themselves as trusted programs or utilities to deceive users.
      • b) Some Trojans create backdoors to give malicious users access to the system:
        • Correct. Many Trojans install backdoors that allow hackers to control the infected system.
      • d) Trojans spread through user interaction such as opening an email attachment or downloading and executing a file from the internet:
        • Correct. Trojans rely on social engineering and user actions to infiltrate systems.
    2. Why "C" is Incorrect:
      • Trojans do not self-replicate.
      • Self-replication is a characteristic of worms or viruses, not Trojans.

    Knowledge Booster:

    1. Key Differences Between Malware Types:
      • Trojan: Does not self-replicate; relies on user action for installation.
      • Virus: Attaches to files and spreads when infected files are executed.
      • Worm: Self-replicates and spreads across networks without user action.
    2. Examples of Trojan Behavior:
      • Stealing sensitive information like login credentials.
      • Installing ransomware or spyware.
      • Using the infected system as part of a botnet.
    3. Interesting Fact:
      • The term "Trojan Horse" is inspired by the Greek myth where a deceptive gift (a wooden horse) was used to infiltrate and attack the city of Troy.

    Free Tests

    Free
    Must Attempt

    SSC GD PYP (Held on 4 Feb 2025 S1)

    languageIcon English
    • pdpQsnIcon80 Questions
    • pdpsheetsIcon160 Marks
    • timerIcon60 Mins
    languageIcon English
    Free
    Must Attempt

    Hindi Section Test 1

    languageIcon English
    • pdpQsnIcon20 Questions
    • pdpsheetsIcon40 Marks
    • timerIcon12 Mins
    languageIcon English
    Free
    Must Attempt

    SSC GD Constable Full Mock Test 1

    languageIcon English
    • pdpQsnIcon80 Questions
    • pdpsheetsIcon160 Marks
    • timerIcon60 Mins
    languageIcon English
    test-prime-package

    Access ‘SSC CGL Tier 2’ Mock Tests with

    • 60000+ Mocks and Previous Year Papers
    • Unlimited Re-Attempts
    • Personalised Report Card
    • 500% Refund on Final Selection
    • Largest Community
    students-icon
    370k+ students have already unlocked exclusive benefits with Test Prime!
    Our Plans
    Monthsup-arrow