A program that does not reproduce itself but pretends to be performing a legitimate action, while acting performing malicious operations in the background is the characteristic of which of the following?

A program that does not reproduce itself but pretends to be performing a legitimate action, while acting performing malicious operations in the background is the characteristic of which of the following?

A program that does not reproduce itself but pretends to be performing a legitimate action, while acting performing malicious operations in the background is the characteristic of which of the following?

A.
Worms

B.
Trapdoor

C.
Virus

D.
Trojan

Explanation:
D: A Trojan is a program that pretends to do one thing while performing another, unwanted action. A Trojan does not reproduce itself as do worms and viruses in order to spread. A trapdoor or backdoor is a hidden mechanism that bypasses access control measures. It is an entry point into a program that is inserted in software by programmers during the programs development to provide a method of gaining access into the program for modifi cation if the access control mechanism malfunctions and locks them out. Developers often refer to them as maintenance hooks. Page 217.



Leave a Reply to joe Cancel reply1

Your email address will not be published. Required fields are marked *

1 + eighteen =


joe

joe

A Trojan is a program that pretends to do one thing while performing another, unwanted action. A Trojan does not reproduce itself as do worms and viruses in order to spread. A trapdoor or backdoor is a hidden mechanism that bypasses access control measures. It is an entry point into a program that is inserted in software by programmers during the programs development to provide a method of gaining access into the program for modifi cation if the access control mechanism malfunctions and locks them out.