• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

1. Which of the following is a method of accessing a computer without the security and

Testbanks Dec 29, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Chapter 1

  • Which of the following is a method of accessing a computer without the security and
  • authentication procedures that are normally required?

  • Trojan horse
  • *b. Backdoor

  • Shell
  • Wrapper
  • Which type of channel is a legal, secure channel for the transfer of data or
  • information within the network of a company?

*a. overt

  • covert
  • hidden
  • public
  • Which type of channel is an illegal, hidden path used to transfer data from a network?
  • tapped
  • overt
  • rogue
  • *d. covert

  • What type of trojan provides attackers with passwords or other confidential data such
  • as credit card numbers and audit sheets?

  • Remote access trojan
  • Proxy trojan
  • *c. Data-sending trojan

  • ICMP Backdoor trojan
  • Which protocol is an integral part of IP, is a connectionless protocol, and is used to
  • provide error messages to unicast addresses?

*a. ICMP

  • SMTP
  • SNMP
  • IRC

(Ethical Hacking and Countermeasures, Threats and Defense Mechanisms, 2e EC-Council) (Test Bank, Correct Answer are marked with*) 1 / 3

  • Which type of trojan permits the attacker to bypass corporate firewalls, make use of
  • ports that are authorized by corporate firewalls, and connect with the outside world through a victim's computer?

  • Proxy
  • ICMP Backdoor
  • *c. Reverse connecting

  • Remote access
  • What is a program that is used to bind trojan executables to legitimate files?
  • Binders
  • Assemblers
  • Compilers
  • *d. Wrappers

  • Which tool used by trojan creators is run with the user's IP address after starting a
  • Netcat listener on the user's machine at port 8080?

  • Windows Reverse Shell
  • *b. RemoteByMail

  • Perl-Reverse Shell
  • Atelier Web Remote Commander
  • Which of the following is NOT a typical step in detecting trojans?
  • Scan for suspicious open ports
  • Scan for suspicious registry entries
  • *c. Scan for ICMP type 8 packets

  • Scan for suspicious network activities
  • Which tool can help detect trojans by displaying ports on which the computer is
  • listening?

  • PrcView
  • *b. Netstat

  • Tripwire
  • Sfc
  • / 3

Chapter 2

  • Which type of malware is a self-replicating program that produces its own code by
  • attaching copies of itself to other executable codes, and operates without the knowledge or desire of the user.

*a. virus

  • worm
  • Trojan horse
  • rootkit
  • What type of malware spreads automatically using the network?
  • rootkit
  • Trojan horse
  • virus
  • *d. worm

  • Which of the following depends on the reaction of naive users rather than software
  • code that actually causes harm?

  • macro virus
  • shell virus
  • *c. virus hoax

  • multipartite virus
  • Which of the following is an indication of an actual virus attack as opposed to a likely
  • hardware problem?

  • the computer beeps at startup with no screen display
  • *b. unknown files keep appearing on the system

  • the mouse hangs or does not respond
  • the monitor starts flickering
  • Which type of virus forms a layer around the target host program's code that can be
  • compared to an eggshell because it makes itself the original program and the host code its subroutine?

  • Add-on viruses
  • Intrusive viruses
  • Boot viruses
  • *d. Shell viruses

  • / 3

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

I was amazed by the practical examples in this document. It helped me ace my presentation. Truly superb!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Testbanks
Added: Dec 29, 2025
Description:

Chapter 1 1. Which of the following is a method of accessing a computer without the security and authentication procedures that are normally required? a. Trojan horse *b. Backdoor c. Shell d. Wrapp...

Unlock Now
$ 1.00