What is an example of non-propagating malicious code?
What is an example of non-propagating malicious code?
A Trojan horse is an example of non-propagating malicious code. Unlike worms and viruses which can replicate and spread to other systems, a Trojan horse relies on deception to be executed by the user, and it does not self-replicate. It typically masquerades as a legitimate application to trick users into running it, and once executed, it can perform its malicious activities. Trojan horses do not propagate on their own, making them non-propagating malicious code.
backdoor is code. trojan is malware
A back door is not code. This should be a Trojan horse .
Wow these questions.. Technically a Trojan Horse is also malicous Code so both Trojan Horse and Backdoor would be correct
A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so, Trojan malware and Trojan virus are often used interchangeably. https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html Backdoor: A backdoor is a malware type that negates normal authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to remotely issue system commands and update malware.
the correct answer is Backdoor.