Deck 10: Trojan Horses

Full screen (f)
exit full mode
Question
A Trojan can perform almost any task on a computer that a human can.
Use Space or
up arrow
down arrow
to flip the card.
Question
For Trojans to be a threat, they must be installed by the user and activated.
Question
Trojan horse attacks are strictly a "Windows users' problem."
Question
Never accept attachments that are not expected.
Question
XNetStat is a GUI-based netstat tool for Linux that will help you monitor your machine for open ports.
Question
Typical functions for a Trojan might include ____, taking screen captures, accessing files on local and shared drives, or acting as a server where the client is the hacker.

A)detecting a virus
B)logging keystrokes
C)deleting other Trojan horses
D)detecting worms
Question
____ is a utility package for Linux.

A)Linux-util
B)Linux-patch
C)Linux-apt
D)Apt-util
Question
____ is a Trojan horse designed and used to make a horde of zombies to do the hacker's bidding.

A)NetBus
B)Pretty Park
C)BO2K
D)AIDS
Question
____ is a site owned by the Carnegie Mellon Software Engineering Institute that tracks Internet threats.

A)www.securityfocus.com
B)www.slashdot.com
C)www.nist.org
D)www.cert.org
Question
____ is a remote administration server that allows system administrators to control a computer from a remote location.

A)Back Orifice
B)Pretty Park
C)AIDS
D)PC-Write
Question
The original Trojan horse appears in Homer's ____________________.
Question
____________________ are machines that have been unobtrusively "owned" by a hacker.
Question
When a machine is ____________________, the hacker can back door into it at any time and perform actions from that machine as if she were sitting at its keyboard.
Question
____________________ was the first known Trojan horse.
Question
A widely used method that detects Trojans is called ____________________. This is similar to reconciling your check register every month to verify that the number of deposits and withdrawals match your bank statement.
Question
What are some of the distribution vectors used by recent Trojan attacks?
Question
What are some of the actions that Trojans can perform?
Question
What are some of the most famous Trojans?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Trojan Horses
1
A Trojan can perform almost any task on a computer that a human can.
True
2
For Trojans to be a threat, they must be installed by the user and activated.
True
3
Trojan horse attacks are strictly a "Windows users' problem."
False
4
Never accept attachments that are not expected.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
XNetStat is a GUI-based netstat tool for Linux that will help you monitor your machine for open ports.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
Typical functions for a Trojan might include ____, taking screen captures, accessing files on local and shared drives, or acting as a server where the client is the hacker.

A)detecting a virus
B)logging keystrokes
C)deleting other Trojan horses
D)detecting worms
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a utility package for Linux.

A)Linux-util
B)Linux-patch
C)Linux-apt
D)Apt-util
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a Trojan horse designed and used to make a horde of zombies to do the hacker's bidding.

A)NetBus
B)Pretty Park
C)BO2K
D)AIDS
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a site owned by the Carnegie Mellon Software Engineering Institute that tracks Internet threats.

A)www.securityfocus.com
B)www.slashdot.com
C)www.nist.org
D)www.cert.org
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a remote administration server that allows system administrators to control a computer from a remote location.

A)Back Orifice
B)Pretty Park
C)AIDS
D)PC-Write
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
The original Trojan horse appears in Homer's ____________________.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ are machines that have been unobtrusively "owned" by a hacker.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
When a machine is ____________________, the hacker can back door into it at any time and perform actions from that machine as if she were sitting at its keyboard.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
____________________ was the first known Trojan horse.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
A widely used method that detects Trojans is called ____________________. This is similar to reconciling your check register every month to verify that the number of deposits and withdrawals match your bank statement.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
What are some of the distribution vectors used by recent Trojan attacks?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
What are some of the actions that Trojans can perform?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
What are some of the most famous Trojans?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.