The Full Wiki

Trojan horse (computing): Quiz


Question 1: Trojan Horses at the ________
Open Directory ProjectTime WarnerJim BarksdaleLife (magazine)

Question 2: Use of the machine as part of a ________ (i.e.
Storm botnetComputer wormBotnetMalware

Question 3: Also, there have been reports of ________ that are themselves Trojan horses.
Programming languageCompilerCompiler optimizationAssembly language

Question 4: In situations where the security of the computer system is critical, it is advisable to simply erase all data from the ________ and reinstall the operating system and required software.
USB flash driveFloppy diskHard disk driveUniversal Serial Bus

Question 5: A Trojan, sometimes refered to as a Trojan horse, is non-self-replicating ________ that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system.
SharewareMalwareSpywareProprietary software

Question 6: The term is derived from the Trojan Horse story in ________.
MuseApolloHeraGreek mythology

Question 7: In fact, it is possible for hackers to scan computers on a network using a ________ in the hope of finding one with a Trojan horse installed, that the hacker can then use to control the target computer.
Port scannerFirewall (computing)Computer securityHacker (computer security)

Got something to say? Make a comment.
Your name
Your email address