Exam 10: Defending Against Trojan Horses,spyware,and Adware
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
A Trojan horse application sometimes creates a ____________ that allows the originator an easy alternative access into a computer system.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
back door
____________ is probably the most widely known adware product.
Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Gator
A ____________ is an application that appears to have a good purpose but actually performs some malicious function.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Trojan horse
Which is spyware loaded from a Web page via Java and purported to be a simple marketing tool?
(Multiple Choice)
4.9/5
(30)
Why should downloads of files be restricted to the IT department?
(Multiple Choice)
4.8/5
(23)
A system that has port 20034 blocked on all servers,workstations,and routers is not susceptible to the ____________ Trojan.
(Short Answer)
4.8/5
(36)
____________ is an anti-spyware program that provides a free trial period and a system diagnostics utility.
(Short Answer)
4.8/5
(41)
Applications designed to create pop-ups on the user's machine are called ____________.
(Short Answer)
4.7/5
(33)
Which adware product is involved in suing anti-spyware companies?
(Multiple Choice)
4.7/5
(36)
A Trojan horse that spreads malware is also called a(n)____________.
(Short Answer)
4.8/5
(35)
Many believe that there are certain features in Microsoft products that seem to favor usability over ____________.
(Short Answer)
4.8/5
(40)
Which remote administration tool only operates on port 20034?
(Multiple Choice)
4.8/5
(38)
What is the best approach to preventing systems from being exploited by a Trojan horse?
(Multiple Choice)
4.8/5
(31)
A term for programs that attempt to collect information from a user's computer and make it available to another is ____________.
(Short Answer)
4.8/5
(43)
Showing 1 - 20 of 26
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)