Which description best distinguishes a Trojan Horse from a virus?

Get ready for your Fundamentals of Computing Test. Utilize flashcards and multiple-choice questions. Every question includes hints and explanations. Prepare effectively and ace your exam now!

Multiple Choice

Which description best distinguishes a Trojan Horse from a virus?

Explanation:
Think in terms of how each threat gets you to run it and how it moves between machines. A Trojan horse relies on deception: it hides inside a file or program that looks legitimate, so you run it because it appears harmless or useful. Once you execute it, it can do its malicious work, but it doesn’t automatically copy itself to other computers. A virus, by contrast, is built to spread. It attaches to other programs or files and replicates itself, moving to other machines when infected files are shared or executed. So a description that says the Trojan is disguised as a normal file and the virus spreads to other computers captures the essential difference between them.

Think in terms of how each threat gets you to run it and how it moves between machines. A Trojan horse relies on deception: it hides inside a file or program that looks legitimate, so you run it because it appears harmless or useful. Once you execute it, it can do its malicious work, but it doesn’t automatically copy itself to other computers. A virus, by contrast, is built to spread. It attaches to other programs or files and replicates itself, moving to other machines when infected files are shared or executed. So a description that says the Trojan is disguised as a normal file and the virus spreads to other computers captures the essential difference between them.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy