82.8k views
1 vote
What characteristic describes a trojan horse?

O the use of stolen credentials to access private data
O a network device that filters access and traffic coming into a network
O malicious software or code running on an end device
O applications that protect end devices from becoming infected with malicious software

1 Answer

4 votes

Final answer:

The characteristic that describes a Trojan horse in relation to computer security is malicious software or code running on an end device.

Therefore, the correct answer is: option "malicious software or code running on an end device"

Step-by-step explanation:

A Trojan horse is malicious software disguised as legitimate, used by hackers to infiltrate systems, often to steal data or cause harm. It is one of many methods used by attackers to compromise networks and devices. Unlike viruses or worms, a Trojan horse disguises itself as a legitimate program to deceive users into executing it.

Once inside the system, it can conduct a variety of activities, which might include stealing credentials, installing backdoors, or damaging the system in some manner.

Hackers use Trojan horses as one of their methods to break into systems and networks, often with the intent of exfiltrating private data or causing harm. As such, protecting against Trojan horses usually involves a combination of cybersecurity best practices and antimalware applications.

User Alex Thomas
by
8.2k points