Home » Cyber Security » Understanding Attack Vectors
Que.A/an ___________ is a program that steals your logins & passwords for instant messaging applications. a. IM – Trojans b. Backdoor Trojans c. Trojan-Downloader d. Ransom Trojan
Que._____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access. a. IM – Trojans b. Backdoor Trojans c. Trojan-Downloader d. Ransom Trojan
Que.The ______________ can cost you money, by sending text messages from your mobile phone numbers. a. IM – Trojans b. Backdoor Trojans c. SMS Trojan d. Ransom Trojan
Que.Trojan-Spy programs can keep an eye on how you are using your system. a. True b. False c. May be True or False d. Can’t say
Que.A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information. a. front-door b. backdoor c. clickjacking d. key-logging
Que.A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware. a. crypter b. virus c. backdoor d. key-logger
Que.Backdoors cannot be designed as ______________ a. the hidden part of a program b. as a part of Trojans c. embedded code of the firmware d. embedded with anti-malware
Show Answer embedded with anti-malware
Que.Trojans having backdoors are harmless. a. True b. False c. May be True or False d. Can’t say
Que.The threat of backdoors started when ____________ & ____________ OSs became widely accepted. a. single-user, Windows b. multiuser, networked c. single-user, UNIX d. multiuser, UNIX
Que.Backdoors are also known as ______________ a. Malware-doors b. Trojan-backups c. Front-doors d. Trapdoors