Filters
Question type

Study Flashcards

What are some of the distribution vectors used by recent Trojan attacks?

Correct Answer

verifed

verified

Recent Trojan attacks have used several ...

View Answer

What are some of the actions that Trojans can perform?

Correct Answer

verifed

verified

Trojans, like any commercial remote admi...

View Answer

A Trojan can perform almost any task on a computer that a human can.

Correct Answer

verifed

verified

____ is a Trojan horse designed and used to make a horde of zombies to do the hacker's bidding.


A) NetBus
B) Pretty Park
C) BO2K
D) AIDS

Correct Answer

verifed

verified

Trojan horse attacks are strictly a "Windows users' problem."

Correct Answer

verifed

verified

A widely used method that detects Trojans is called ____________________. This is similar to reconciling your check register every month to verify that the number of deposits and withdrawals match your bank statement.

Correct Answer

verifed

verified

object reconciliation

____ is a site owned by the Carnegie Mellon Software Engineering Institute that tracks Internet threats.


A) www.securityfocus.com
B) www.slashdot.com
C) www.nist.org
D) www.cert.org

Correct Answer

verifed

verified

D

What are some of the most famous Trojans?

Correct Answer

verifed

verified

Famous Trojans inclu...

View Answer

When a machine is ____________________, the hacker can back door into it at any time and perform actions from that machine as if she were sitting at its keyboard.

Correct Answer

verifed

verified

____ is a utility package for Linux.


A) Linux-util
B) Linux-patch
C) Linux-apt
D) Apt-util

Correct Answer

verifed

verified

XNetStat is a GUI-based netstat tool for Linux that will help you monitor your machine for open ports.

Correct Answer

verifed

verified

The original Trojan horse appears in Homer's ____________________.

Correct Answer

verifed

verified

____ is a remote administration server that allows system administrators to control a computer from a remote location.


A) Back Orifice
B) Pretty Park
C) AIDS
D) PC-Write

Correct Answer

verifed

verified

Typical functions for a Trojan might include ____, taking screen captures, accessing files on local and shared drives, or acting as a server where the client is the hacker.


A) detecting a virus
B) logging keystrokes
C) deleting other Trojan horses
D) detecting worms

Correct Answer

verifed

verified

____________________ was the first known Trojan horse.

Correct Answer

verifed

verified

Never accept attachments that are not expected.

Correct Answer

verifed

verified

For Trojans to be a threat, they must be installed by the user and activated.

Correct Answer

verifed

verified

True

____________________ are machines that have been unobtrusively "owned" by a hacker.

Correct Answer

verifed

verified

Showing 1 - 18 of 18

Related Exams

Show Answer