Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here
Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Answerclub

Answerclub Logo Answerclub Logo

Answerclub Navigation

  • Home
  • About Us
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • About Us
  • Contact Us

Welcome to Answerclub.org

Questions | Answers | Discussions | Knowledge sharing | Communities & more.

Get App on Playstore
Home/ Questions/Q 210978
Next
In Process

Answerclub Latest Questions

HDM
  • 0
  • 0
Poll
HDMKnowledge Contributor
Asked: August 30, 20242024-08-30T17:20:42+05:30 2024-08-30T17:20:42+05:30In: Education

What is Trojan Attack

  • 0
  • 0

Poll Results

33.33%A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.A simple way to answer the question "what is Trojan" is it is a type of malware that typically gets hidden as an attachment in an email or a free-to-download file, then transfers onto the user’s device. Once downloaded, the malicious code will execute the task the attacker designed it for, such as gain backdoor access to corporate systems, spy on users’ online activity, or steal sensitive data.Indications of a Trojan being active on a device include unusual activity such as computer settings being changed unexpectedly. ( 1 voter )
66.67%The Trojan horse was a unique solution to the target’s defenses. In the original story, the attackers had laid siege to the city for 10 years and hadn’t succeeded in defeating it. The Trojan horse gave them the access they had been wanting for a decade. A Trojan virus, similarly, can be a good way to get behind an otherwise tight set of defenses.The Trojan horse appeared to be a legitimate gift. In a similar vein, a Trojan virus looks like legitimate software.The soldiers in the Trojan horse controlled the city’s defense system. With a Trojan virus, the malware takes control of your computer, potentially leaving it vulnerable to other “invaders.” ( 2 voters )
Based On 3 Votes

Participate in Poll, Choose Your Answer.

What is Trojan Attack
1
  • 1 1 Answer
  • 32 Views
  • 0 Followers
  • 0
Answer
  • Report

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. manali
    manali Knowledge Contributor
    2024-08-31T10:58:24+05:30Added an answer on August 31, 2024 at 10:58 am

    A Trojan attack involves malicious software (a Trojan horse) disguised as a legitimate program or file. Once installed, it can perform harmful actions such as stealing data, spying on users, or granting unauthorized access to systems. Unlike viruses or worms, Trojans don’t self-replicate but rely on tricking users into installing them.

      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

You must login to add an answer.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sidebar

Ask A Question

Stats

  • Questions 56,929
  • Answers 51,386
  • Popular
  • Answers
  • Mr.Doge

    What are the best AI tools available for Creative Designing?

    • 47 Answers
  • Mr.Doge

    How is tax calculated in India for investing in US ...

    • 41 Answers
  • Mr.Doge

    How to invest in NCD/ Corporate Bonds in India? Is ...

    • 35 Answers
  • Providence Adworks
    Providence Adworks added an answer SEO plays a vital role in increasing a brand’s visibility… October 14, 2025 at 11:17 am
  • dmktg42 singhal
    dmktg42 singhal added an answer Home Depot offers a variety of weed mats for gardens,… October 14, 2025 at 10:46 am
  • sports Mainia
    sports Mainia added an answer Golfiya Sports Store is a sports retail brand that offers… October 14, 2025 at 9:34 am

Related Questions

  • Why is CBSE affiliation important when choosing schools in Gorakhpur?

    • 1 Answer
  • Why do parents trust Momentum for their child’s medical test ...

    • 1 Answer
  • Why should schools choose an Interactive Panel For School?

    • 1 Answer
  • What industries benefit most from Third-Party Inspection Services?

    • 1 Answer
  • How has Momentum’s IIT JEE Test Series helped students crack ...

    • 1 Answer

Trending Tags

ai biology branch of study business cricket education english food general knowledge. general science geography gk health history poll question science sports technology travel

Explore

  • Home
  • Groups
  • Add group
  • Catagories
  • Questions
    • New Questions
    • Most Answered
  • Polls
  • Tags
  • Badges

© 2024 Answerclub.org | All Rights Reserved
Designed & Developed by INFINITEBOX & TechTrends