GCIH Exam Question 1

John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 of the Weare- secure server is open. He suspects that it may be open due to a Trojan installed on the server. He presents a report to the company describing the symptoms of the Trojan. A summary of the report is given below: Once this Trojan has been installed on the computer, it searches Notpad.exe, renames it Note.com, and then copies itself to the computer as Notepad.exe. Each time Notepad.exe is executed, the Trojan executes and calls the original Notepad to avoid being noticed.
Which of the following Trojans has the symptoms as the one described above?
  • GCIH Exam Question 2

    Which of the following types of malware can an antivirus application disable and destroy?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 3

    Your company has been hired to provide consultancy, development, and integration services for a company named
    Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case
    study, which of the following steps will you suggest for configuring WebStore1?
    Each correct answer represents a part of the solution. Choose two.
  • GCIH Exam Question 4

    Which of the following tools is used to download the Web pages of a Website on the local system?
  • GCIH Exam Question 5

    Which of the following attacks involves multiple compromised systems to attack a single target?