- (Topic 7)
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
Correct Answer:D
As the hardware keylogger never interacts with the Operating System it is undetectable by anti-virus or anti-spyware products.
- (Topic 1)
Which of the following tool would be considered as Signature Integrity Verifier (SIV)?
Correct Answer:D
- (Topic 2)
Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him. What would Yancey be considered?
Correct Answer:A
- (Topic 8)
You have just received an assignment for an assessment at a company site. Company's management is concerned about external threat and wants to take appropriate steps to insure security is in place. Anyway the management is also worried about possible threats coming from inside the site, specifically from employees belonging to different Departments. What kind of assessment will you be performing ?
Correct Answer:C
Internal Testing is also referred to as Gray-box testing.
- (Topic 1)
In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?
Correct Answer:E