Networking Chapter 10 Trojan Horses Define Trojan Horse Application Trojan Horse Possibly Malicious Application

subject Type Homework Help
subject Pages 3
subject Words 798
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 10: Trojan Horses
1. Define a Trojan horse application.
2. Explain why all attachments are possible Trojan suspects.
3. What is the difference between installation strategy and transmission vector as those concepts
apply to Trojan horse applications?
4. Name four installation strategies.
5. Name six transmission vectors.
6. Is there any legitimate reason to use remote administration applications?
page-pf2
7. Name ten executable files (or extensions) for Windows platforms.
BAS - Visual Basic Class Module, BAT - Batch File, CHM - Compiled HTML Help File, CMD -
Windows NT Command Script, COM - MS-DOS Application, CPL - Control Panel Extension,
9. Is Nimda a Trojan horse? Why or why not?
10. Is Zabbix a Trojan horse? Why or why not?
Indicate whether the sentence or statement is true or false.
11.What does Tripwire send to an administrator when a file has been changed?
page-pf3
12. The Enterprise solution of Tripwire includes what management solution?
13. MD5 creates a 128-bit hash value. True or False?
14. In addition to adware, what does Spybot Search & Destroy remove from a computer?
15. What was the first malware detector that located the Stuxnet malware?
16. What was the first malware detector used to create a bank Trojan?
17. In addition to identifying Trojans, what can MetaSploit be used to create?
18. In addition to Trojan horses, what was Trojan Remover created to remove?
19. Name an example of a commonly used anti-malware product that has a large commercial
20. The avenues for distributing a Trojan horse have decreased over time. True or False?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.