Question
a.
IM
b.
Attachments
c.
Official product sites
d.
Un-trusted sites, freeware and pirated software
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of them is not a proper way of getting into the system?
Similar Questions
Discover Related MCQs
Q. Which of the following port is not used by Trojans?
View solution
Q. Trojans do not do one of the following. What is that?
View solution
Q. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.
View solution
Q. Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
View solution
Q. Trojans can not ______________
View solution
Q. A _______________ provides malicious users remote control over the targeted computer.
View solution
Q. _______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards.
View solution
Q. ______________ perform automated DoS (Denial of Service) attacks on a targeted web address.
View solution
Q. Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs.
View solution
Q. ____________ work in background & keeps on downloading other malicious programs when the system is online.
View solution
Q. A/an ___________ is a program that steals your logins & passwords for instant messaging applications.
View solution
Q. _____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.
View solution
Q. The ______________ can cost you money, by sending text messages from your mobile phone numbers.
View solution
Q. Trojan-Spy programs can keep an eye on how you are using your system.
View solution
Q. A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.
View solution
Q. A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.
View solution
Q. Backdoors cannot be designed as ______________
View solution
Q. Trojans having backdoors are harmless.
View solution
Q. The threat of backdoors started when ____________ & ____________ OSs became widely accepted.
View solution
Q. Backdoors are also known as ______________
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!