Difficulty: Easy
Correct Answer: are legitimate programs that allow unauthorized access
Explanation:
Introduction / Context:
A Trojan horse is a classic category of malware that masquerades as a useful or legitimate program while secretly performing malicious actions. Understanding how Trojans work helps users avoid social-engineering traps and administrators harden systems.
Given Data / Assumptions:
Concept / Approach:
The defining feature of a Trojan is deception: it gets installed and run because it looks benign (e.g., a utility, game, or installer). Once executed, it may install backdoors, change security settings, or open command-and-control channels, thereby allowing unauthorized access or control.
Step-by-Step Solution:
Verification / Alternative check:
Security glossaries define Trojans as deceptive software delivering a hidden payload; antivirus vendors categorize them distinctly from worms (self-replicating) and viruses (code-injecting into other files).
Why Other Options Are Wrong:
Common Pitfalls:
Confusing Trojans with viruses or worms; assuming code must be invisible to qualify as a Trojan; ignoring that user consent is manipulated via deception.
Final Answer:
are legitimate programs that allow unauthorized access
Discussion & Comments