Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- To protect against Trojan attacks, how does Tripwire and other similar applications assist us?
- It's a file-integrity checking tool that detects and rejects malware designed for the kernel.
- It's an antivirus solution that quarantines and removes malware right away.
- It's a file integrity checker that alerts you when a system file is changed.
- It's an antivirus program that detects and removes viruses during a scan.
- To continually pull data and monitor a network, what is typically used?
- Trojan
- APT
- A rootkit
- A virus
- What component can be used to install malware on a target?
- Crypter
- Dropper
- Exploit
- Obfuscator
- What is the name of a program that is concealed within another program?
- Multipart
- Ransomware
- Trojan
- Stealth