Which of the following options would indicate the best course of action for John?
Which definition below best describes a covert channel?
A file integrity program such as Tripwire protects against Trojan horse attacks by:
Sniffing is considered an active attack.
Which of the following Netcat commands would be used to perform a UDP scan of the lower 1024 ports?
What can he do to help ensure this?
In Linux, the three most common commands that hackers usually attempt to Trojan are:
What is the next step you would do?
Which command would you execute to extract the Trojan to a standalone file?
Which of the following statements would not be a proper definition for a Trojan Horse?