Question
a.
IM – Trojans
b.
Backdoor Trojans
c.
Trojan-Downloader
d.
Ransom Trojan
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. _____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give...
Similar Questions
Discover Related MCQs
Q. The ______________ can cost you money, by sending text messages from your mobile phone numbers.
View solution
Q. Trojan-Spy programs can keep an eye on how you are using your system.
View solution
Q. A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.
View solution
Q. A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.
View solution
Q. Backdoors cannot be designed as ______________
View solution
Q. Trojans having backdoors are harmless.
View solution
Q. The threat of backdoors started when ____________ & ____________ OSs became widely accepted.
View solution
Q. Backdoors are also known as ______________
View solution
Q. __________ is a powerful RAT build using the language Delphi 7.
View solution
Q. Which of the following is a remote Trojan?
View solution
Q. A ___________ consists of at least one bot server or controller and one or more client-bots.
View solution
Q. Botnets are managed by ______________
View solution
Q. A _____________ is a number of Internet-connected systems, where each of them is running one or more bots.
View solution
Q. _____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.
View solution
Q. Botnets are not used for ______________
View solution
Q. The owner of botnets can control the botnet using ___________________ software.
View solution
Q. The full form of C&C is ____________
View solution
Q. The word “botnet” is a blend of the words _____________ & ___________
View solution
Q. Botnets are not the logical connection of which of the following?
View solution
Q. Infected computers and other systems within the botnet are called __________
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!