Free 312-50 Exam Braindumps (page: 59)

Page 58 of 191

In the context of Trojans, what is the definition of a Wrapper?

  1. An encryption tool to protect the Trojan.
  2. A tool used to bind the Trojan with legitimate file.
  3. A tool used to encapsulated packets within a new header and footer.
  4. A tool used to calculate bandwidth and CPU cycles wasted by the Trojan.

Answer(s): B

Explanation:

These wrappers allow an attacker to take any executable back-door program and combine it with any legitimate executable, creating a Trojan horse without writing a single line of new code.



After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?

  1. Install pactehs
  2. Setup a backdoor
  3. Cover your tracks
  4. Install a zombie for DDOS

Answer(s): C

Explanation:

As a hacker you don’t want to leave any traces that could lead back to you.



Which of the following statements would not be a proper definition for a Trojan Horse?

  1. An unauthorized program contained within a legitimate program.
    This unauthorized program performs functions unknown (and probably unwanted) by the user.
  2. A legitimate program that has been altered by the placement of unauthorized code within it; this code perform functions unknown (and probably unwanted) by the user.
  3. An authorized program that has been designed to capture keyboard keystrokes while the user remains unaware of such an activity being performed.
  4. Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.

Answer(s): C

Explanation:

A Trojan is all about running unauthorized code on the users computer without the user knowing of it.



You have hidden a Trojan file virus.exe inside another file readme.txt using NTFS streaming.
Which command would you execute to extract the Trojan to a standalone file?

  1. c:\> type readme.txt:virus.exe > virus.exe
  2. c:\> more readme.txt | virus.exe > virus.exe
  3. c:\> cat readme.txt:virus.exe > virus.exe
  4. c:\> list redme.txt$virus.exe > virus.exe

Answer(s): C

Explanation:

cat will concatenate, or write, the alternate data stream to its own file named virus.exe






Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

312-50 Exam Discussions & Posts