• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

What is a characteristic of a Trojan horse as it relates to network security?

  • An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.
  • Extreme quantities of data are sent to a particular network device interface.
  • Too much information is destined for a particular memory block, causing additional memory areas to be affected.
  • Malware is contained in a seemingly legitimate executable program.
Answers Explanation & Hints:

A Trojan horse carries out malicious operations under the guise of a legitimate program. Denial of service attacks send extreme quantities of data to a particular host or network device interface. Password attacks use electronic dictionaries in an attempt to learn passwords. Buffer overflow attacks exploit memory buffers by sending too much information to a host to render the system inoperable.

For more Questions and Answers:

CCNA 3 v7 – ENSA v7.02 Final Exam Answers Full 100%

CyberOps Associate 1.0 & CA 1.02 Final Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments