CEH

(Jeff_L) #1

208 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels



  1. An overt channel is.
    A. An obvious method of using a system
    B. A defined process in a system
    C. A backdoor or unintended vulnerability
    D. A Trojan on a system

  2. A covert channel or backdoor may be detected using all of the following except.
    A. Nmap
    B. Sniffers
    C. An SDK
    D. Netcat

  3. A remote access Trojan would be used to do all of the following except.
    A. Steal information
    B. Remote-control a system
    C. Sniff traffic
    D. Attack another system

  4. A logic bomb has how many parts, typically?
    A. 1
    B. 2
    C. 3
    D. 4

  5. A logic bomb is activated by which of the following?
    A. Time and date
    B. Date and vulnerability
    C. Actions
    D. Events

  6. A polymorphic virus.
    A. Evades detection through backdoors
    B. Evades detection through heuristics
    C. Evades detection through rewriting itself
    D. Evades detection through luck

  7. A sparse infector virus.
    A. Creates backdoors
    B. Infects data and executables
    C. Infects files selectively
    D. Rewrites itself

Free download pdf