00:00

QUESTION 31

Which of the following malicious software travels across computer networks without the assistance of a user?

Correct Answer: A

QUESTION 32

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

Correct Answer: C

QUESTION 33

Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.

Correct Answer: AD

QUESTION 34

You enter the netstat -an command in the command prompt and you receive intimation that port number 7777 is open on your computer. Which of the following Trojans may be installed on your computer?

Correct Answer: D

QUESTION 35

Which of the following tools can be used for steganography?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: AC