A computer installed with port monitoring, file monitoring, network monitoring, and
antivirus software and connected to network only under strictly controlled conditions is
known as:
Sheep Dip
Droidsheep
Sandbox
Malwarebytes
Sheep Dip
Which of the following channels is used by an attacker to hide data in an undetectable
protocol?
Classified
Overt
Encrypted
Covert
Covert
Which of the following techniques rely on tunneling to transmit one protocol data in
another protocol?
Scanning
Steganography
A covert channel
Asymmetric routing
A covert channel
Which of the following Rootkit Trojans performs targeted attacks against various
organizations and arrives on the infected system by being downloaded and executed by
the Trickler dubbed "DoubleFantasy," covered by TSL20110614-01
(Trojan.Win32.Micstus.A)?
, GrayFish rootkit
Hardware/firmware rootkit
Boot loader level rootkit
EquationDrug rootkit
EquationDrug rootkit
A covert channel is a channel that:
Transfers information over, within a computer system, or network that is outside of the
security policy.
Transfers information over, within a computer system, or network that is within the
security policy.
Transfers information via a communication path within a computer system, or network
for transfer of data.
Transfers information over, within a computer system, or network that is encrypted.
Transfers information over, within a computer system, or network that is outside of the
security policy.
Javier works as a security analyst for a small company. He has heard about a new
threat; a new malware that the antivirus does not detect yet. Javier has the hash for the
new virus. What can Javier do to proactively protect his company?
Block with the antivirus anything that presents the same hash of the malware
Wait for the antivirus company to release a new version
Generate his own new version of the antivirus with the malware hash
Send the hash information to the antivirus company
Block with the antivirus anything that presents the same hash of the malware
Which component of the malware conceals the malicious code via various techniques,
thus making it hard for security mechanisms to detect or remove it?
Downloader
Crypter