Which of the following worms has attacked the computer?

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based
network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the
company complains to John that his system contains an unknown package named as tar.gz and
his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about
the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that
the other computers on the network are also facing the same problem. John discovers that a
malicious application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based
network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the
company complains to John that his system contains an unknown package named as tar.gz and
his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about
the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that
the other computers on the network are also facing the same problem. John discovers that a
malicious application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?

A.
Code red

B.
Ramen

C.
LoveLetter

D.
Nimda

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *