Final answer:
Trojan malware can create backdoors, disguise as legitimate software, and spread through email attachments.
Step-by-step explanation:
Trojan malware refers to malicious software that disguises itself as legitimate software to deceive users and gain unauthorized access to their systems. The three statements that are true about Trojan malware are:
- Trojans can create backdoors for hackers to access a system. Once a Trojan is installed on a system, it can provide remote access to hackers, allowing them to control the system and potentially steal sensitive information or carry out other malicious activities.
- Trojans can disguise themselves as legitimate software. They often masquerade as useful or desirable programs, tricking users into unknowingly downloading and installing them. This allows the Trojan to gain access to the system and perform its malicious activities.
- Trojans can spread through email attachments. Emails with infected attachments can deliver Trojans to unsuspecting users. Opening such attachments can trigger the installation of the Trojan, compromising the user's system.
The statement that is not true is D) Trojans can only infect computers with outdated operating systems. Trojans can infect any computer, regardless of the operating system version.