This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Chapter 10: Trojan Horses
1. Define a Trojan horse application.
2. Explain why all attachments are possible Trojan suspects.
3. What is the difference between installation strategy and transmission vector as those concepts
apply to Trojan horse applications?
4. Name four installation strategies.
5. Name six transmission vectors.
6. Is there any legitimate reason to use remote administration applications?
7. Name ten executable files (or extensions) for Windows platforms.
BAS - Visual Basic Class Module, BAT - Batch File, CHM - Compiled HTML Help File, CMD -
Windows NT Command Script, COM - MS-DOS Application, CPL - Control Panel Extension,
9. Is Nimda a Trojan horse? Why or why not?
10. Is Zabbix a Trojan horse? Why or why not?
Indicate whether the sentence or statement is true or false.
11.What does Tripwire send to an administrator when a file has been changed?
12. The Enterprise solution of Tripwire includes what management solution?
13. MD5 creates a 128-bit hash value. True or False?
14. In addition to adware, what does Spybot Search & Destroy remove from a computer?
15. What was the first malware detector that located the Stuxnet malware?
16. What was the first malware detector used to create a bank Trojan?
17. In addition to identifying Trojans, what can MetaSploit be used to create?
18. In addition to Trojan horses, what was Trojan Remover created to remove?
19. Name an example of a commonly used anti-malware product that has a large commercial
20. The avenues for distributing a Trojan horse have decreased over time. True or False?
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.