208 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels
- An overt channel is.
A. An obvious method of using a system
B. A defined process in a system
C. A backdoor or unintended vulnerability
D. A Trojan on a system - A covert channel or backdoor may be detected using all of the following except.
A. Nmap
B. Sniffers
C. An SDK
D. Netcat - A remote access Trojan would be used to do all of the following except.
A. Steal information
B. Remote-control a system
C. Sniff traffic
D. Attack another system - A logic bomb has how many parts, typically?
A. 1
B. 2
C. 3
D. 4 - A logic bomb is activated by which of the following?
A. Time and date
B. Date and vulnerability
C. Actions
D. Events - A polymorphic virus.
A. Evades detection through backdoors
B. Evades detection through heuristics
C. Evades detection through rewriting itself
D. Evades detection through luck - A sparse infector virus.
A. Creates backdoors
B. Infects data and executables
C. Infects files selectively
D. Rewrites itself