Which of the following is a program that runs at a specific date and time to cause unwanted and unauthorized functions?

Which of the following is a program that runs at a specific date and time to cause unwanted and
unauthorized functions?

Which of the following is a program that runs at a specific date and time to cause unwanted and
unauthorized functions?

A.
Keylogger

B.
Logic bomb

C.
Spyware

D.
Trojan horse

Explanation:
A logic bomb is a malicious program that executes when a predetermined event occurs. For
example, a logic bomb can execute when a user logs on to a computer or presses certain keys on the
keyboard. It can also execute on a particular date or time specified by developers.

Answer D is incorrect. Trojan horse is a malicious software program code that masquerades itself as
a normal program. When a Trojan horse program is run, its hidden code runs to destroy or scramble
data on the hard disk. An example of a Trojan horse is a program that masquerades as a computer
logon to retrieve user names and password information. The developer of a Trojan horse can use
this information later to gain unauthorized access to computers. Trojan horses are normally spread
by e-mail attachments. Unlike viruses, Trojan horses do not replicate themselves but only destroy
information on hard disks.

Answer A is incorrect. A keylogger is a software tool that traces all or specific activities of a user on a
computer. Once a keylogger is installed on a victim’s computer, it can be used for recording all
keystrokes on the victim’s computer in a predefined log file. An attacker can configure a log file in
such a manner that it can be sent automatically to a predefined e-mail address. Some of the main
features of a keylogger are as follows:
It can record all keystrokes.
It can capture all screenshots.
It can record all instant messenger conversations.
It can be remotely installed.
It can be delivered via FTP or e-mail.

Answer C is incorrect. Spyware is a computer program that collects all the information on the
computer user and sends it to another computer or destination. It is used for monetary gain. It may
have several ways of making money by using the information obtained. It tries to violate the privacy
of the computer without causing damage to the computer or the software installed on it.



Leave a Reply 0

Your email address will not be published. Required fields are marked *