CISA Certified Information Systems Auditor – Question1914

A trojan horse simply cannot operate autonomously.

A.
true
B. false

Correct Answer: A

Explanation:

Explanation:
As a common type of Trojan horses, a legitimate software might have been corrupted with malicious code which runs when the program is used. The key is that the user has to invoke the program in order to trigger the malicious code. In other words, a trojan horse simply cannot operate autonomously. You would also want to know that most but not all trojan horse payloads are harmful – a few of them are harmless.