250+ Understanding Attack Vectors part-4

Que.A/an ___________ is a program that steals your logins & passwords for instant messaging applications.
a. IM – Trojans
b. Backdoor Trojans
c. Trojan-Downloader
d. Ransom Trojan
Que._____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.
a. IM – Trojans
b. Backdoor Trojans
c. Trojan-Downloader
d. Ransom Trojan
Que.The ______________ can cost you money, by sending text messages from your mobile phone numbers.
a. IM – Trojans
b. Backdoor Trojans
c. SMS Trojan
d. Ransom Trojan
Que.Trojan-Spy programs can keep an eye on how you are using your system.
a. True
b. False
c. May be True or False
d. Can’t say
Que.A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.
a. front-door
b. backdoor
c. clickjacking
d. key-logging
Que.A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.
a. crypter
b. virus
c. backdoor
d. key-logger
Que.Backdoors cannot be designed as ______________
a. the hidden part of a program
b. as a part of Trojans
c. embedded code of the firmware
d. embedded with anti-malware
Que.Trojans having backdoors are harmless.
a. True
b. False
c. May be True or False
d. Can’t say
Que.The threat of backdoors started when ____________ & ____________ OSs became widely accepted.
a. single-user, Windows
b. multiuser, networked
c. single-user, UNIX
d. multiuser, UNIX
Que.Backdoors are also known as ______________
a. Malware-doors
b. Trojan-backups
c. Front-doors
d. Trapdoors