Correct Answer: Shell virus
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Ethical Hacking Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Ethical Hacking MCQ Questions
Which is correct about stealth scan or half-Open scan? i) With stealth scan, the chances of triggering the detection mechanism are high. ii) Stealth scan is less reliable as compared to full-Open scan.
Which of the following is the syntax of ping sweep using Nmap for ICMP scanning?
In relation to ethical hacking. which of the following options refers to a method. which is used for determining the type of operating system running on a remote computer?
In relation to switched network sniffing, which of the following options is represented by a switchport?
attack sends a combination of malformed IP packets to the victim system and causes the system to crash. The malformed packets consist of invalid/unexpected fragmentation. TCP segments, protocol, header values, packet size. offsets. routing flags. etc.
_____ is a protocol for securely accessing a remote computer.
With ____, you can have your desktop computer or laptop start in both windows and linux.
Hackers use __________ to execute arbitrary scripts through the web browser.
Hackers can gain access to computer systems through the use of ____.
What are the features of worms?