Which of the following malicious software travels across computer networks without the assistance of a user?
Correct Answer:
A
Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?
Correct Answer:
C
Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.
Correct Answer:
AD
You enter the netstat -an command in the command prompt and you receive intimation that port number 7777 is open on your computer. Which of the following Trojans may be installed on your computer?
Correct Answer:
D
Which of the following tools can be used for steganography?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
AC