adplus-dvertising
frame-decoration

Question

____________ work in background & keeps on downloading other malicious programs when the system is online.

a.

DDoS-Trojan

b.

Backdoor Trojan

c.

Trojan-Banker

d.

Trojan-Downloader

Answer: (d).Trojan-Downloader

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ____________ work in background & keeps on downloading other malicious programs when the system is online.

Similar Questions

Discover Related MCQs

Q. A/an ___________ is a program that steals your logins & passwords for instant messaging applications.

Q. _____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.

Q. The ______________ can cost you money, by sending text messages from your mobile phone numbers.

Q. Trojan-Spy programs can keep an eye on how you are using your system.

Q. A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.

Q. A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.

Q. Backdoors cannot be designed as ______________

Q. Trojans having backdoors are harmless.

Q. The threat of backdoors started when ____________ & ____________ OSs became widely accepted.

Q. Backdoors are also known as ______________

Q. __________ is a powerful RAT build using the language Delphi 7.

Q. Which of the following is a remote Trojan?

Q. A ___________ consists of at least one bot server or controller and one or more client-bots.

Q. Botnets are managed by ______________

Q. A _____________ is a number of Internet-connected systems, where each of them is running one or more bots.

Q. _____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.

Q. Botnets are not used for ______________

Q. The owner of botnets can control the botnet using ___________________ software.

Q. The full form of C&C is ____________

Q. The word “botnet” is a blend of the words _____________ & ___________