Question 1 point
__________ is a worm for Windows XP that downloads and executes malicious files on the
compromised computer and spreads through removable storage devices.
a. HTTP W32.Drom
b. W32/VBAut-B
c. W32/QQRob-ADN
d. W32/SillyFDC-BK
View Feedback
Question 2 point
__________ monitors and audits databases for security issues in real time.
a. Selective Audit
b. AppDetective
c. AppRadar
d. FlexTracer
View Feedback
Question 3 point
,Which of the following attacks would you choose to seize control of a legitimate user’s web
application session while the session is still in progress?
a. session hijacking
b. DOS attack
c. password sniffing
d. spoofing
View Feedback
Question 4 point
__________ viruses search all drives and connected network shares to locate files with an EXE
or SCR extension.
a. W32/Madang-Fam
b. W32/Hasnot-A
c. W32/Fujacks-AK
d. W32/Fujacks-E
View Feedback
Question 5 point
,In order for traffic to get back to the attacker during session hijacking, a process called
__________ is used that allows the sender to specify a particular route for the IP packet to take
to the destination.
a. desynchronization
b. source routing
c. spoofing
d. TCP routing
View Feedback
Question 6 point
A __________ attack occurs when an attacker sends an oversized ping packet to a victim’s
device.
a. BlueSmacking
b. Blueprinting
c. BTVoiceBugging
d. Bluesnarfing
View Feedback
, Question 7 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after
connecting to it.
a. CheckOK
b. SMTPCheck
c. SMTPMon
d. SLCheck
View Feedback
Question 8 point
Which of the following definitions best describes a wrapper?
a. A wrapper is a packet-crafting technique used to perform stealthy port scans.
b. A wrapper is an encryption tool used to hide messages inside image files.
c. A wrapper is a method of hiding a virus inside an executable file.
d. A wrapper is a tool used to bind a Trojan to a legitimate file.
View Feedback