Exam 10: Defending Against Trojan Horses,spyware,and Adware

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A Trojan horse application sometimes creates a ____________ that allows the originator an easy alternative access into a computer system.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

back door

____________ is probably the most widely known adware product.

Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Verified

Gator

A ____________ is an application that appears to have a good purpose but actually performs some malicious function.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

Trojan horse

Which is spyware loaded from a Web page via Java and purported to be a simple marketing tool?

(Multiple Choice)
4.9/5
(30)

Why should downloads of files be restricted to the IT department?

(Multiple Choice)
4.8/5
(23)

Which is NOT a likely symptom of a Trojan horse infection?

(Multiple Choice)
4.9/5
(36)

A system that has port 20034 blocked on all servers,workstations,and routers is not susceptible to the ____________ Trojan.

(Short Answer)
4.8/5
(36)

____________ is an anti-spyware program that provides a free trial period and a system diagnostics utility.

(Short Answer)
4.8/5
(41)

Applications designed to create pop-ups on the user's machine are called ____________.

(Short Answer)
4.7/5
(33)

Why should users be cautious of hidden file extensions?

(Multiple Choice)
4.8/5
(32)

What is the purpose of a Trojan horse?

(Multiple Choice)
4.8/5
(26)

Which adware product is involved in suing anti-spyware companies?

(Multiple Choice)
4.7/5
(36)

What is the purpose of spyware?

(Multiple Choice)
4.8/5
(44)

A Trojan horse that spreads malware is also called a(n)____________.

(Short Answer)
4.8/5
(35)

What does adware do?

(Multiple Choice)
5.0/5
(39)

Many believe that there are certain features in Microsoft products that seem to favor usability over ____________.

(Short Answer)
4.8/5
(40)

Which remote administration tool only operates on port 20034?

(Multiple Choice)
4.8/5
(38)

What is the best approach to preventing systems from being exploited by a Trojan horse?

(Multiple Choice)
4.8/5
(31)

Which is one of the most famous Trojan horses?

(Multiple Choice)
4.8/5
(41)

A term for programs that attempt to collect information from a user's computer and make it available to another is ____________.

(Short Answer)
4.8/5
(43)
Showing 1 - 20 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)