adplus-dvertising
frame-decoration

Question

How does a Trojan horse work?

a.

It operates normally and infects the system behind the user's back

b.

It alerts the user that the system has been infected

c.

It destroys the original application to eliminate any suspicion

d.

It spreads through direct human interaction

Posted under Reverse Engineering

Answer: (a).It operates normally and infects the system behind the user's back Explanation:The functional element of the program works normally while the malicious element operates behind the user's back.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. How does a Trojan horse work?