978-0840020932 Chapter 10

subject Type Homework Help
subject Pages 4
subject Words 834
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 10: Trojan Horses
TRUE/FALSE
1. A Trojan can perform almost any task on a computer that a human can.
2. For Trojans to be a threat, they must be installed by the user and activated.
3. Trojan horse attacks are strictly a “Windows users’ problem.”
4. Never accept attachments that are not expected.
5. XNetStat is a GUI-based netstat tool for Linux that will help you monitor your machine for open ports.
MULTIPLE CHOICE
1. Typical functions for a Trojan might include ____, taking screen captures, accessing files on local and
shared drives, or acting as a server where the client is the hacker.
a.
detecting a virus
c.
deleting other Trojan horses
b.
logging keystrokes
d.
detecting worms
2. ____ is a utility package for Linux.
a.
Linux-util
c.
Linux-apt
b.
Linux-patch
d.
Apt-util
3. ____ is a Trojan horse designed and used to make a horde of zombies to do the hacker’s bidding.
a.
NetBus
c.
BO2K
b.
Pretty Park
d.
AIDS
4. ____ is a site owned by the Carnegie Mellon Software Engineering Institute that tracks Internet threats.
a.
www.securityfocus.com
c.
www.nist.org
b.
www.slashdot.com
d.
www.cert.org
5. ____ is a remote administration server that allows system administrators to control a computer from a
remote location.
page-pf2
a.
Back Orifice
c.
AIDS
b.
Pretty Park
d.
PC-Write
COMPLETION
1. The original Trojan horse appears in Homer’s ____________________.
2. ____________________ are machines that have been unobtrusively “owned” by a hacker.
3. When a machine is ____________________, the hacker can back door into it at any time and perform
actions from that machine as if she were sitting at its keyboard.
4. ____________________ was the first known Trojan horse.
5. A widely used method that detects Trojans is called ____________________. This is similar to
reconciling your check register every month to verify that the number of deposits and withdrawals match
your bank statement.
SHORT ANSWER
1. What are some of the distribution vectors used by recent Trojan attacks?
page-pf3
2. What are some of the actions that Trojans can perform?
3. What are some of the most famous Trojans?
4. Briefly describe the main characteristics of the Trojan AIDS.
5. Briefly describe the main characteristics of the Trojan BO2K.
page-pf4

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.