GCIH Exam Question 76

Which of the following statements is true about the difference between worms and Trojan horses?
  • GCIH Exam Question 77

    Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.
    Which of the following are the two popular types of buffer overflows?
    Each correct answer represents a complete solution. Choose two.
  • GCIH Exam Question 78

    Which of the following statements about a Trojan horse are true?
    Each correct answer represents a complete solution. Choose two.
  • GCIH Exam Question 79

    You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the
    computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to
    accomplish the task?
  • GCIH Exam Question 80

    Which of the following types of malware does not replicate itself but can spread only when the
    circumstances are beneficial?