What can he do to help ensure this?
John wishes to install a new application onto his Windows 2000 server.
He wants to ensure that any application he uses has not been Trojaned.
What can he do to help ensure this?
In Linux, the three most common commands that hackers usually attempt to Trojan are:
In Linux, the three most common commands that hackers usually attempt to Trojan are:
What is the next step you would do?
You suspect that your Windows machine has been compromised with a Trojan virus. When you run anti-virus software it does not pick of the Trojan. Next you run netstat command to look for open ports and you notice a strange port 6666 open.
What is the next step you would do?
Which command would you execute to extract the Trojan to a standalone file?
You have hidden a Trojan file virus.exe inside another file readme.txt using NTFS
streaming.
Which command would you execute to extract the Trojan to a standalone file?
Which of the following statements would not be a proper definition for a Trojan Horse?
Which of the following statements would not be a proper definition for a Trojan Horse?
what would be one of the last steps that would be taken to ensure that the compromise is not traced back to th
After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?
what is the definition of a Wrapper?
In the context of Trojans, what is the definition of a Wrapper?
Which of the following commands accomplish this?
You want to use netcat to generate huge amount of useless network data continuously for various performance testing between 2 hosts.
Which of the following commands accomplish this?
What is a Trojan Horse?
What is a Trojan Horse?
what type of general attack could compromise the data?
Assuring two systems that are using IPSec to protect traffic over the internet, what type of general attack could compromise the data?