250+ Understanding Attack Vectors part-3

Que.Which of the following port is not used by Trojans?
a. UDP
b. TCP
c. SMTP
d. MP
Que.Trojans do not do one of the following. What is that?
a. Deleting Data
b. Protecting Data
c. Modifying Data
d. Copying Data
Que.Some Trojans carry ransomware with them to encrypt the data and ask for ransom.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
a. virus, cyber-criminals
b. malware, penetration testers
c. trojans, cyber-criminals
d. virus, penetration testers
Que.Trojans can not ______________
a. steal data
b. self-replicate
c. steal financial information
d. steal login credentials
Que.A _______________ provides malicious users remote control over the targeted computer.
a. DDoS-Trojan
b. Backdoor Trojan
c. Trojan-Banker
d. Trojan-Downloader
Que._______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards.
a. DDoS-Trojan
b. Backdoor Trojan
c. Trojan-Banker
d. Trojan-Downloader
Que.______________ perform automated DoS (Denial of Service) attacks on a targeted web address.
a. DDoS-Trojan
b. Backdoor Trojan
c. Trojan-Banker
d. Trojan-Downloader
Que.Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs.
a. True
b. False
c. May be True or False
d. Can’t say
Que.____________ work in background & keeps on downloading other malicious programs when the system is online.
a. DDoS-Trojan
b. Backdoor Trojan
c. Trojan-Banker
d. Trojan-Downloader