ISACA Exam Questions

Which of the following refers to a method of bypassing normal system authentication procedures?

Which of the following refers to a method of bypassing normal system authentication procedures?

A.
virus

B.
worm

C.
trojan horse

D.
spyware

E.
rootkits

F.
backdoor

G.
None of the choices.

Explanation:

A backdoor is a method of bypassing normal authentication procedures.
Many computer manufacturers used to preinstall backdoors on their systems to provide technical
support for customers. Hackers typically use backdoors to secure remote access to a computer,
while attempting to remain hidden from casual
inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.