• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

What characteristic describes a Trojan horse?

  • an attack that slows or crashes a device or network service
  • malicious software or code running on an end device
  • a network device that filters access and traffic coming into a network
  • the use of stolen credentials to access private data
Explanation & Hint:

A Trojan horse is characterized as malicious software or code running on an end device. It is often disguised as legitimate software, or is included within legitimate software, and can be used by cyber attackers to gain unauthorized access to systems, disrupt operations, gather sensitive information, or cause harm to the host system. Trojans are a form of malware and are distinct from other types of attacks or network devices because they require an end user to install them, usually inadvertently, by opening an email attachment or downloading them from the internet.

For more Questions and Answers:

CCNA 1 v7 – ITN v7.02 – ITNv7 – Final Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments