Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?
Correct Answer:
C
Which of the following can be used to perform session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
ABD
CORRECT TEXT
Fill in the blank with the correct numeric value.
ARP poisoning is achieved in ______ steps.
Correct Answer:
2
An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?
Correct Answer:
D
Jane works as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. Jane is troubleshooting the computer of a user who has installed software that automatically gains full permissions on his computer. Jane has never seen this software before. Which of the following types of malware is the user facing on his computer?
Correct Answer:
A