8.3.7 Practice Questions Flashcards
Listen to exam instructions
Which of the following is malware that works by stealth to capture information and then sends it to a hacker to gain remote access?answer
Crackers
Spyware
Writable services
ERD Commander
Spyware
Which of the following do hackers install in systems to allow them to have continued admittance, gather sensitive information, or establish access to resources and operations within the system?
answer
Backdoors
Crackers
cPassword
Kerberos
Backdoors
Hackers can maintain access to a system in several ways. Which of the following best describes the unsecure file and folder method?
answer
The hacker will have rights to do whatever the admin account can do.
This can lead to DLL hijacking and malicious file installations on a non-admin targeted user.
Services with weak permissions allow anyone to alter the execution of the service.
There is no problem if the path is written within quotation marks and has no spaces.
This can lead to DLL hijacking and malicious file installations on a non-admin targeted user.
Listen to exam instructions
Which of the following system exploitation methods happens by adding a malicious file to a file path that is missing quotation marks and has spaces in it?
answer
Unsecure file and folder permissions
Spyware
Path interception
Writable services
Path interception
Listen to exam instructions
A hacker finds a system that has a poorly design and unpatched program installed. He wants to create a backdoor for himself. Which of the following tools could he use to establish a backdoor?
answer
Timestomp
AuditPol
Metasploit
CCleaner
Metasploit