Chapter 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A Trojan can include which of the following? A. RAT B. TCP C. Nmap D. Loki

RAT

What is a covert channel? A. An obvious method of using a system B. A defined process in a system C. A backdoor D. A Trojan on a system

A backdoor

A logic bomb is activated by which of the following? A. Time and date B. Vulnerability C. Actions D. Events

A. Time and date C. Actions D. Events

A covert channel or backdoor may be detected using all of the following except __________. A. Nmap B. Sniffers C. An SDK D. Netcat

An SDK

An overt channel is __________. A. An obvious method of using a system B. A defined backdoor process in a system C. A backdoor D. A Trojan on a system

An obvious method of using a system

What is not a benefit of hardware keyloggers? A. Easy to hide B. Difficult to install C. Difficult to detect D. Difficult to log

Difficult to install

A virus does not do which of the following? A. Replicate with user interaction B. Change configuration settings C. Exploit vulnerabilities D. Display pop-ups

Display pop-ups

A polymorphic virus __________. A. Evades detection through backdoors B. Evades detection through heuristics C. Evades detection through rewriting itself D. Evades detection through luck

Evades detection through rewriting itself

A sparse infector virus __________. A. Creates backdoors B. Infects data and executables C. Infects files selectively D. Rewrites itself

Infects files selectively

Which of the following is capable of port redirection? A. Netstat B. TCPView C. Netcat D. Loki

Netcat

What command is used to listen to open ports with netstat? A. netstat -an B. netstat -ports C. netstat -n D. netstat -s

netstat -an

What are worms typically known for? A. Rapid replication B. Configuration changes C. Identity theft D. DDoS

Rapid replication

A remote access Trojan would be used to do all of the following except __________. A. Steal information B. Remotely control a system C. Sniff traffic D. Attack another system

Sniff traffic

A Trojan relies on __________ to be activated. A. Vulnerabilities B. Trickery and deception C. Social engineering D. Port redirection

Social engineering

Which of the following is not a Trojan? A. BO2K B. LOKI C. Subseven D. TCPTROJAN

TCPTROJAN

Which utility will tell you in real time which ports are listening or in another state? A. Netstat B. TCPView C. Nmap D. Loki

TCPView

A logic bomb has how many parts, typically? A. One B. Two C. Three D. Four

Two

Which is/are a characteristic of a virus? A. A virus is malware. B. A virus replicates on its own. C. A virus replicates with user interaction. D. A virus is an item that runs silently.

A. A virus is malware C. A virus replicates with user interaction

Which of the following is/are true of a worm? A. A worm is malware. B. A worm replicates on its own. C. A worm replicates with user interaction. D. A worm is an item that runs silently.

A. A worm is malware B. A worm replicates on its own

Which statement(s) defines malware most accurately? A. Malware is a form of virus. B. Trojans are malware. C. Malware covers all malicious software. D. Malware only covers spyware.

B. Trojans are malware C. Malware covers all malicious software


Ensembles d'études connexes

21 Spanish Speaking Countries & Capitals

View Set

Psych- Chapter 3: Biological Process

View Set

IDEO & Its Shopping Cart Project

View Set

Relative and Absolute Dating Questions

View Set

series 7TO- unit 8 investment companies

View Set

chapter 8 study guide business & personal law

View Set