In the context of Trojans, what is the definition of a Wrapper?
Answer(s): B
These wrappers allow an attacker to take any executable back-door program and combine it with any legitimate executable, creating a Trojan horse without writing a single line of new code.
After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?
Answer(s): C
As a hacker you don’t want to leave any traces that could lead back to you.
Which of the following statements would not be a proper definition for a Trojan Horse?
A Trojan is all about running unauthorized code on the users computer without the user knowing of it.
You have hidden a Trojan file virus.exe inside another file readme.txt using NTFS streaming.Which command would you execute to extract the Trojan to a standalone file?
cat will concatenate, or write, the alternate data stream to its own file named virus.exe
Post your Comments and Discuss EC-Council 312-50 exam with other Community members:
Comeru Commented on December 04, 2024 You pass this exam with these questions. But you need to get the full version. UNITED STATES
ribrahim Commented on June 29, 2023 Done the purchase downloaded successfully thanks! SINGAPORE
Drew Commented on March 08, 2018 need step 3 download activated UNITED STATES
Josh Commented on September 18, 2017 Just paid for it ... seamless experience ... looking forward to using the program to study for the CEH and pass it with flying colors! UNITED STATES
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 312-50 content, but please register or login to continue.