BCIS Unit 13
Select what's true about Trojan malware.
-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewalls -similar to viruses, but do not replicate themselves
intially, the US computer emergency response team determine that meltdown and spectre vulnerabilities would necessitate replacing the impacted chips, but in january 2018 google announced it developed ____, a strategy to mitigate the meltdown and spectre vulnerabilities.
Retpoline
Keystroke-logging Trojan
When activated, saves all keystrokes for subsequent transmission to virus creator
Phishing
tricks users into revealing usernames and passwords by appearing legitimate
Ransomeware
when activated, encrypts files on user hard drive and then sells a decryption program