Ethical Hacking Ch. 8
A Trojan can include which of the following?
RAT
What is a covert channel?
A backdoor
Which is/are a characteristic of a virus?
A virus is malware. A virus replicates with user interaction.
Which of the following is/are true of a worm?
A worm is malware, a worm replicates on its own
A covert channel or backdoor may be detected using all of the following except____________
An SDK
An overt channel is
An obvious method of using a system
What is NOT a benefit of hardware keyloggers?
Difficult to install
A virus does not do which of the following?
Display pop-ups
A polymorphic virus__________
Evades detection through rewriting itself
A sparse infector virus_____________
Infects files selectively
Which of the following is capable of port redirection?
Netcat
What command is used to listen to open ports with netstat?
netstat -an
What are worms typically known for?
Rapid replication
A remote access Trojan would be used to do all of the following except______________
Sniff traffic
A Trojan relies on______________to be activated.
Social engineering
Which of the following is NOT a Trojan?
TCPTROJAN
Which utility will tell you in real time which ports are listening or in another state?
TCPView
A logic bomb is activated by which of the following?
Time and date, Actions, Events
Which statement(s) defines malware most accurately?
Trojan are malware, Malware covers all malicious software, Malware only covers spyware
A logic bomb has how many parts, typically?
Two