CISA Certified Information Systems Auditor – Question1874

Most trojan horse programs are spread through:

A.
e-mails.
B. MP3.
C. MS Office.
D. Word template.
E. None of the choices.

Correct Answer: A

Explanation:

Explanation:
“Most trojan horse programs are spread through e-mails. Some earlier trojan horse programs were bundled in “Root Kits”. For example, the Linux Root Kit version 3 (lrk3) which was released in December 96 had tcp wrapper trojans included and enhanced in the kit. Portable devices that run Linux can also be affected by trojan horse. The Trojan.Linux.JBellz Trojan horse runs as a malformed .mp3 file.”