PDF Download
FREE AND STUDY GAMES ABOUT TESTOUT ETHICAL HACK
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -212 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: Port 31339 Associated Trojans
Answer:
NetSpy DK
Question 2: Port 9989 Associated Trojans
Answer:
iNi-Killer
Question 3: Port 2155 Associated Trojans
Answer:
Illusion Mailer, Nirvana
Question 4: what does netstat -f -b
do?
Answer:
shows the fully qualified domain name (FQDN) and the name of programs that are making connections.
Question 5: Port 1245 Associated Trojans
Answer:
VooDoo Doll
Question 6: Sheep dipping
Answer:
The process of analyzing emails, suspect files, and systems for malware.
Question 7: Ports are included in host integrity monitoring why?
Answer:
Malware often opens ports on the computers. Using tools such as Netstat will show any open ports the malware is using.
Question 8: How to remove Malware
Answer:
If malware is found on a system, follow these steps:
- Isolate the system from the network immediately.
- Verify that the anti-malware software is updated and running. If its not, update it and scan the system.
- Sanitize the system using updated anti-malware software and appropriate techniques.
Question 9: This type of malware Changes the way a computer operates without the user's knowledge.
Answer:
virus
Question 10: Windows services are included in host integrity monitoring why?
Answer:
Malware can spawn additional Windows services or rename malicious processes to look like a Windows service and evade detection. Windows Service Manager can detect changes in services and can also scan for suspicious Windows services.
Question 11: Registry are included in host integrity monitoring why?
Answer:
Monitoring the registry for any changes by the malware is important, as malware will often create registry keys. Scanning the registry for suspicious keys can aid in tracking the malware infection.
Question 12: USA Patriot Act
Answer:
The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA Patriot Act) expanded on the powers already included in the CFAA.Question 13: Heather wants to gain remote access to Randy's machine. She has developed a program and hidden it inside a legitimate program that she is sure Randy will install on his machine. Which of the following types of malware is she using?
Answer:
Trojan horse Question 14: What does this type of Trojan do: IoT
Answer:
Internet of Things devices are the target of IoT Trojans. Smart thermostats, lighting systems, HVAC systems are examples of IoT devices that are are vulnerable to this type of Trojan horse. Mirai
Question 15: Port 61466 Associated Trojans
Answer:
Telecommando
Question 16: Port 30100-02 Associated Trojans
Answer:
NetSphere 1.27a
Question 17: The Computer Fraud and Abuse Act
Answer:
This law was originally passed to address federal computer-related offenses and the cracking of computer systems.
Question 18: Is Standalone malware program.
Answer:
Worm
Question 19: Port 50766 Associated Trojans
Answer:
Fore
Question 20: Port 7000 Associated Trojans
Answer:
RemoteGrab
Question 21: Sheep Dipping
Answer:
The process of analyzing emails, suspect files, and systems for malware is known as sheep dipping.The term comes from the process sheep farmers use to dip sheep in chemical solutions to clear them of parasites.Question 22: A system can be infected by malware in many ways. Some of the more common
methods are:
Answer:
USB drives Phishing emails Downloading and installing from website
Question 23: Host Integrity Monitoring includes monitoring of
Answer:
Ports Processes Registry Windows services Startup programs Event logs Installation Files and folders Device drivers Network traffic DNS Application Program Interface (API) calls