CEH

(Jeff_L) #1

206 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels


Review Questions



  1. Which statement defines malware most accurately?
    A. Malware is a form of virus.
    B. Trojans are malware.
    C. Malware covers all malicious software.
    D. Malware only covers spyware.

  2. Which is a characteristic of a virus?
    A. A virus is malware.
    B. A virus replicates on its own.
    C. A virus replicates with user interaction.
    D. A virus is an item that runs silently.

  3. A virus does not do which of the following?
    A. Replicates with user interaction
    B. Changes configuration settings
    C. Exploits vulnerabilities
    D. Displays pop-ups

  4. Which of the following is true of a worm?
    A. A worm is malware.
    B. A worm replicates on its own.
    C. A worm replicates with user interaction.
    D. A worm is an item that runs silently.

  5. What are worms typically known for?
    A. Rapid replication
    B. Configuration changes
    C. Identity theft
    D. DDoS

  6. What command is used to listen to open ports with netstat?
    A. netstat -an
    B. netstat -ports
    C. netstat -n
    D. netstat -s

Free download pdf