Which of the following software displays advertisements, whether or not the user has consented?

Which of the following software displays advertisements, whether or not the user has consented?

Which of the following software displays advertisements, whether or not the user has consented?

A.
Trojan horse

B.
Honeypot

C.
Spyware

D.
Adware

Explanation:
Adware is software that displays advertisements, whether or not the user has consented. Adware is
software that automatically downloads and display advertisements in the Web browser without user
permission. When a user visits a site or downloads software, sometimes a hidden adware software is
also downloaded to display advertisement automatically. This can be quite irritating to user. Some
adware can also be spyware. Answer option C is incorrect. Spyware is a program that takes partial
control over a user’s computer without user’s permission. Spyware programs can collect various
types of personal information, such as Internet surfing habits, and Web sites that the user has
visited. Spyware programs can also interfere with the control of a user’s computer, such as installing
additional software, redirecting Web browser activities, accessing Web sites blindly, etc. Answer
option B is incorrect. A honeypot is a term in computer terminology used for a trap that is set to
detect, deflect, or in some manner counteract attempts at unauthorized use of information
systems. Generally it consists of a computer, data, or a network site that appears to be part of a
network, but is actually isolated, and monitored, and which seems to contain information or a
resource of value to attackers. Answer option A is incorrect. Trojan horse is a malicious software
program code that masquerades itself as a normal program. When a Trojan horse program is run, its
hidden code runs to destroy or scramble data on the hard disk. An example of a Trojan horse is a
program that masquerades as a computer logon to retrieve user names and password information.
The developer of a Trojan horse can use this information later to gain unauthorized access to
computers. Trojan horses are normally spread by e-mail attachments. Unlike viruses, Trojan horses
do not replicate themselves but only destroy information on hard disks.
Reference:
“http://en.wikipedia.org/wiki/Adware”



Leave a Reply 0

Your email address will not be published. Required fields are marked *