- (Topic 6)
In the context of Trojans, what is the definition of a Wrapper?
Correct Answer:
B
These wrappers allow an attacker to take any executable back-door program and combine it with any legitimate executable, creating a Trojan horse without writing a single line of new code.
- (Topic 4)
What is the proper response for a NULL scan if the port is closed?
Correct Answer:
E
Closed ports respond to a NULL scan with a reset.
- (Topic 19)
When referring to the Domain Name Service, what is denoted by a ‘zone’?
Correct Answer:
B
A reasonable definition of a zone would be a portion of the DNS namespace where responsibility has been delegated.
- (Topic 23)
How do you defend against DHCP Starvation attack?
Correct Answer:
B
- (Topic 23)
In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?
Correct Answer:
E