• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT TESTOUT ETHICAL HACK

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT TESTOUT ETHICAL HACK

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -212 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation

Question 1: Port 31339 Associated Trojans

Answer:

NetSpy DK

Question 2: Port 9989 Associated Trojans

Answer:

iNi-Killer

Question 3: Port 2155 Associated Trojans

Answer:

Illusion Mailer, Nirvana

Question 4: what does netstat -f -b

do?

Answer:

shows the fully qualified domain name (FQDN) and the name of programs that are making connections.

Question 5: Port 1245 Associated Trojans

Answer:

VooDoo Doll

Question 6: Sheep dipping

Answer:

The process of analyzing emails, suspect files, and systems for malware.

Question 7: Ports are included in host integrity monitoring why?

Answer:

Malware often opens ports on the computers. Using tools such as Netstat will show any open ports the malware is using.

Question 8: How to remove Malware

Answer:

If malware is found on a system, follow these steps:

  • Isolate the system from the network immediately.
  • Verify that the anti-malware software is updated and running. If its not, update it and scan the system.
  • Sanitize the system using updated anti-malware software and appropriate techniques.
  • Question 9: This type of malware Changes the way a computer operates without the user's knowledge.

Answer:

virus

Question 10: Windows services are included in host integrity monitoring why?

Answer:

Malware can spawn additional Windows services or rename malicious processes to look like a Windows service and evade detection. Windows Service Manager can detect changes in services and can also scan for suspicious Windows services.

Question 11: Registry are included in host integrity monitoring why?

Answer:

Monitoring the registry for any changes by the malware is important, as malware will often create registry keys. Scanning the registry for suspicious keys can aid in tracking the malware infection.

Question 12: USA Patriot Act

Answer:

The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA Patriot Act) expanded on the powers already included in the CFAA.Question 13: Heather wants to gain remote access to Randy's machine. She has developed a program and hidden it inside a legitimate program that she is sure Randy will install on his machine. Which of the following types of malware is she using?

Answer:

Trojan horse Question 14: What does this type of Trojan do: IoT

Answer:

Internet of Things devices are the target of IoT Trojans. Smart thermostats, lighting systems, HVAC systems are examples of IoT devices that are are vulnerable to this type of Trojan horse. Mirai

Question 15: Port 61466 Associated Trojans

Answer:

Telecommando

Question 16: Port 30100-02 Associated Trojans

Answer:

NetSphere 1.27a

Question 17: The Computer Fraud and Abuse Act

Answer:

This law was originally passed to address federal computer-related offenses and the cracking of computer systems.

Question 18: Is Standalone malware program.

Answer:

Worm

Question 19: Port 50766 Associated Trojans

Answer:

Fore

Question 20: Port 7000 Associated Trojans

Answer:

RemoteGrab

Question 21: Sheep Dipping

Answer:

The process of analyzing emails, suspect files, and systems for malware is known as sheep dipping.The term comes from the process sheep farmers use to dip sheep in chemical solutions to clear them of parasites.Question 22: A system can be infected by malware in many ways. Some of the more common

methods are:

Answer:

USB drives Phishing emails Downloading and installing from website

Question 23: Host Integrity Monitoring includes monitoring of

Answer:

Ports Processes Registry Windows services Startup programs Event logs Installation Files and folders Device drivers Network traffic DNS Application Program Interface (API) calls

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE AND STUDY GAMES ABOUT TESTOUT ETHICAL HACK Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -212 Questions and Answers -format set of mul...

UNLOCK ACCESS $11.99