Skillsets
Certifications
Contact
Sign Up
Login
Home
Skillsets
Certifications
Contact
Help
FAQ
System and Device Attacks
SKILLSET
System and Device Attacks
Steganography
Password Cracking
Malware Identification
Mobile Device Penetration Testing
Social Engineering
Anti-Forensics
Privilege Escalation Attacks
Related Questions
Lately a trojan became infamous for stealing banking information. What was it called?
Spyware is intended to cause annoyance to the system's owner.
The first virus of significance to appear was the _____ virus of 1986.
Viruses can be classified into different categories according to how they behave. What's a stealth virus?
Which of these is a way of detecting a virus in a system?
Once a virus has spread on a system, what does a security professional do in order to identify the infection?
After the banking Trojan Zeus is executed on a system, it starts listening on port:
Which of these viruses was released in 2001 and sought to bring the Internet down to its knees by primarily infecting Internet Servers?
During which phase does a virus replicate itself?
To distract the user while installing a Trojan on his/her system, you would package it with:
×