Interview Questions Answers.ORG
Interviewer And Interviewee Guide
Interviews
Quizzes
Home
Quizzes
Interviews TCP/IP Protocols Interviews:Application LayerFTPHypertext Transfer Protocol (HTTP)Internet Message Access Protocol (IMAP)Internet Protocol (IP) AddressMobile IPNetworking ProtocolsPOP / POP3Secured Socket Layer (SSL)SMTPSNMPSOAPSpanning Tree Protocol (STP)SS7TCP LayerTCP/IPUDPWAP
Copyright © 2018. All Rights Reserved
UDP Interview Question:
What is throjan?
Submitted by: AdministratorNamed after the Trojan Horse of ancient Greek history, a
trojan is a network software application designed to remain
hidden on an installed computer. Trojans generally serve
maliciious purposes and are therefore a form of malware,
like viruses.
Trojans sometimes, for example, access personal information
stored locally on home or business computers, then send
these data to a remote party via the Internet.
Alternatively, trojans may serve merely as a "backdoor"
application, opening network ports to allow other network
applications access to that computer. Trojans are also
capable of launching Denial of Service (DoS) attacks. A
combination of firewalls and antivirus software protect
networks against trojans.
Trojans are similiar to worms. In contrast to worms and
viruses, however, trojans do not replicate themselves or
seek to infect other systems once installed on a computer.
Submitted by: Administrator
trojan is a network software application designed to remain
hidden on an installed computer. Trojans generally serve
maliciious purposes and are therefore a form of malware,
like viruses.
Trojans sometimes, for example, access personal information
stored locally on home or business computers, then send
these data to a remote party via the Internet.
Alternatively, trojans may serve merely as a "backdoor"
application, opening network ports to allow other network
applications access to that computer. Trojans are also
capable of launching Denial of Service (DoS) attacks. A
combination of firewalls and antivirus software protect
networks against trojans.
Trojans are similiar to worms. In contrast to worms and
viruses, however, trojans do not replicate themselves or
seek to infect other systems once installed on a computer.
Submitted by: Administrator
Copyright 2007-2024 by Interview Questions Answers .ORG All Rights Reserved.
https://InterviewQuestionsAnswers.ORG.
https://InterviewQuestionsAnswers.ORG.