Ethical Hacking Ch. 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A Trojan can include which of the following?

RAT

What is a covert channel?

A backdoor

Which is/are a characteristic of a virus?

A virus is malware. A virus replicates with user interaction.

Which of the following is/are true of a worm?

A worm is malware, a worm replicates on its own

A covert channel or backdoor may be detected using all of the following except____________

An SDK

An overt channel is

An obvious method of using a system

What is NOT a benefit of hardware keyloggers?

Difficult to install

A virus does not do which of the following?

Display pop-ups

A polymorphic virus__________

Evades detection through rewriting itself

A sparse infector virus_____________

Infects files selectively

Which of the following is capable of port redirection?

Netcat

What command is used to listen to open ports with netstat?

netstat -an

What are worms typically known for?

Rapid replication

A remote access Trojan would be used to do all of the following except______________

Sniff traffic

A Trojan relies on______________to be activated.

Social engineering

Which of the following is NOT a Trojan?

TCPTROJAN

Which utility will tell you in real time which ports are listening or in another state?

TCPView

A logic bomb is activated by which of the following?

Time and date, Actions, Events

Which statement(s) defines malware most accurately?

Trojan are malware, Malware covers all malicious software, Malware only covers spyware

A logic bomb has how many parts, typically?

Two


Ensembles d'études connexes

natomy and Physiology I chapter 6 (text/assesment questions + prelab/lab)

View Set

Exam Domain 1 - Palo Alto Networks Cybersecurity Portfolio Core

View Set

What do the initials ICD stand for?

View Set

Cultural geography chapter 6 test

View Set

Female Reproduction (Lec 13 & 14)

View Set

Chapter 3: Texas in the Federal System

View Set