Exam 10: Trojan Horses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A widely used method that detects Trojans is called ____________________. This is similar to reconciling your check register every month to verify that the number of deposits and withdrawals match your bank statement.

Free
(Short Answer)
4.7/5
(33)
Correct Answer:
Verified

object reconciliation

For Trojans to be a threat, they must be installed by the user and activated.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

____ is a site owned by the Carnegie Mellon Software Engineering Institute that tracks Internet threats.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

D

When a machine is ____________________, the hacker can back door into it at any time and perform actions from that machine as if she were sitting at its keyboard.

(Short Answer)
4.7/5
(37)

____ is a Trojan horse designed and used to make a horde of zombies to do the hacker's bidding.

(Multiple Choice)
4.9/5
(28)

____ is a utility package for Linux.

(Multiple Choice)
4.8/5
(41)

____ is a remote administration server that allows system administrators to control a computer from a remote location.

(Multiple Choice)
4.8/5
(41)

The original Trojan horse appears in Homer's ____________________.

(Short Answer)
4.7/5
(33)

What are some of the distribution vectors used by recent Trojan attacks?

(Essay)
4.9/5
(28)

Trojan horse attacks are strictly a "Windows users' problem."

(True/False)
4.8/5
(29)

____________________ was the first known Trojan horse.

(Short Answer)
4.7/5
(36)

What are some of the actions that Trojans can perform?

(Essay)
4.8/5
(35)

A Trojan can perform almost any task on a computer that a human can.

(True/False)
4.8/5
(36)

____________________ are machines that have been unobtrusively "owned" by a hacker.

(Short Answer)
4.7/5
(23)

Never accept attachments that are not expected.

(True/False)
4.9/5
(31)

XNetStat is a GUI-based netstat tool for Linux that will help you monitor your machine for open ports.

(True/False)
4.8/5
(30)

Typical functions for a Trojan might include ____, taking screen captures, accessing files on local and shared drives, or acting as a server where the client is the hacker.

(Multiple Choice)
4.9/5
(25)

What are some of the most famous Trojans?

(Short Answer)
4.9/5
(40)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)