What is a Trojan Horse Virus? - Definition, Examples & Removal Options


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which option below best describes the primary intent of a Trojan horse?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Which option below contains a key word or words used to describe a primary characteristic of a Trojan horse?

2. Which option below identifies the most likely to experience a Trojan horse attack?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

Trojan horse viruses are very sneaky, and the worksheet/quiz pairing is written to see what you know about a Trojan horse virus. Some questions in the quiz ask you to select the correct answer option about the intent and possibility of a Trojan horse attack.

Quiz & Worksheet Goals

The quiz will assess your understanding of these ideas:

  • Device most likely to experience a Trojan horse attack
  • Primary intent and characteristic of a Trojan horse
  • Avoiding infection by a Trojan horse virus

Skills Practiced

Compute how well you utilize these skills by completing the quiz and worksheet:

  • Reading comprehension - ensure that you draw the most important information about Trojan horse viruses from the related lesson
  • Making connections - use your knowledge of electronic devices to understand which device might be attacked by a Trojan horse
  • Critical thinking - apply relevant concepts to examine information about computer viruses in a different light
  • Knowledge application - use your knowledge to answer questions about keeping your electronic devices free from Trojan horse viruses

Additional Learning

Feel like you need to learn more? You are invited to check out the accompanying lesson entitled What is a Trojan Horse Virus? - Definition, Examples & Removal Options. You will find these objectives within the lesson:

  • Identify a real-world example of a Trojan horse message
  • Learn what programs Trojan horse viruses can look like
  • Understand that Trojan horse viruses can be designed to look like real-world games and applications
  • Know options for recovering from a Trojan horse attack