Free II0-001 Exam Braindumps (page: 30)

Page 29 of 58

The following methods will detect or defeat hardware keylogging except:

  1. Virus scanner
  2. Physical inspection
  3. Monitoring file writes
  4. Sniffer

Answer(s): A



Trojan Horse programs are capable of the following except

  1. Remotely viewing of target system's screen output
  2. Modifying files
  3. Opening a CDROM drive
  4. Viewing webcam installed
  5. Keylogging
  6. All of the above are possible

Answer(s): F



A method of countermeasure for trojan horse is which one of the following:

  1. View network connections with the netstat command
  2. Use the trojdel32 utility to search for unregistered DLL files
  3. Place a disk thrashing utility on the suspect system
  4. Perform background checks on all system administrators

Answer(s): A



A firewall is an effective method of preventing trojan horse programs from contacting their master server.

  1. True
  2. False

Answer(s): A






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts