Exam 10: Trojan Horses
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
A widely used method that detects Trojans is called ____________________. This is similar to reconciling your check register every month to verify that the number of deposits and withdrawals match your bank statement.
Free
(Short Answer)
4.7/5
(33)
Correct Answer:
object reconciliation
For Trojans to be a threat, they must be installed by the user and activated.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
____ is a site owned by the Carnegie Mellon Software Engineering Institute that tracks Internet threats.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
D
When a machine is ____________________, the hacker can back door into it at any time and perform actions from that machine as if she were sitting at its keyboard.
(Short Answer)
4.7/5
(37)
____ is a Trojan horse designed and used to make a horde of zombies to do the hacker's bidding.
(Multiple Choice)
4.9/5
(28)
____ is a remote administration server that allows system administrators to control a computer from a remote location.
(Multiple Choice)
4.8/5
(41)
The original Trojan horse appears in Homer's ____________________.
(Short Answer)
4.7/5
(33)
What are some of the distribution vectors used by recent Trojan attacks?
(Essay)
4.9/5
(28)
A Trojan can perform almost any task on a computer that a human can.
(True/False)
4.8/5
(36)
____________________ are machines that have been unobtrusively "owned" by a hacker.
(Short Answer)
4.7/5
(23)
XNetStat is a GUI-based netstat tool for Linux that will help you monitor your machine for open ports.
(True/False)
4.8/5
(30)
Typical functions for a Trojan might include ____, taking screen captures, accessing files on local and shared drives, or acting as a server where the client is the hacker.
(Multiple Choice)
4.9/5
(25)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)