Trojans and Backdoors

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

This set of Cyber Security Questions and Answers for Aptitude test focuses

on “Attack Vectors – Trojans and Backdoors – 2”.

1. A/an ___________ is a program that steals your logins &


passwords for instant messaging applications.
a) IM – Trojans
b) Backdoor Trojans
c) Trojan-Downloader
d) Ransom Trojan
View Answer Answer: a
Explanation: An IM Trojan is a program that steals your logins & passwords for instant
messaging applications. It popularly attacked apps like AOL, Yahoo Pager, and Skype
with vulnerabilities.
2. _____________ can modify data on your system – so that your
system doesn’t run correctly or you can no longer access
specific data, or it may even ask for ransom in order to give your
access.
a) IM – Trojans
b) Backdoor Trojans
c) Trojan-Downloader
d) Ransom Trojan
View Answer Answer: d
Explanation: Ransom Trojan can modify data on your system – so that your system
doesn’t run correctly or you can no longer access specific data, or it may even ask for
ransom in order to give your access.
3. The ______________ can cost you money, by sending text
messages from your mobile phone numbers.
a) IM – Trojans
b) Backdoor Trojans
c) SMS Trojan
d) Ransom Trojan
View Answer Answer: c
Explanation: The SMS Trojans can cost you money, by sending text messages from your
mobile phone numbers. These generally target the smart-phones & some of them are
designed to send their own composed SMS also, to embarrass the receiver as well as
the sender of the SMS.
4. Trojan-Spy programs can keep an eye on how you are using
your system.
a) True
b) False
View Answer Answer: a
Explanation: Trojan-Spy programs can keep an eye on how you are using your system.
These are one of the most notorious silent observers which even track your browsing
data and record your behaviour. Also, it keeps track of all the programs you use.
5. A ___________ is a method in which a computer security
mechanism is bypassed untraceable for accessing the
computer or its information.
a) front-door
b) backdoor
c) clickjacking
d) key-logging
View Answer
6. A _________________ may be a hidden part of a program, a
separate infected program a Trojan in disguise of an executable
or code in the firmware of any system’s hardware.
a) crypter
b) virus
c) backdoor
d) key-logger
View Answer
7. Backdoors cannot be designed as ______________
a) the hidden part of a program
b) as a part of Trojans
c) embedded code of the firmware
d) embedded with anti-malware
View Answer
8. Trojans having backdoors are harmless.
a) True
b) False
View Answer
9. The threat of backdoors started when ____________ &
____________ OSs became widely accepted.
a) single-user, Windows
b) multiuser, networked
c) single-user, UNIX
d) multiuser, UNIX
View Answer
10. Backdoors are also known as ______________
a) Malware-doors
b) Trojan-backups
c) Front-doors
d) Trapdoors
View Answer
11. __________ is a powerful RAT build using the language
Delphi 7.
a) Stuxnet
b) T-Bomb
c) Beast
d) Zeus
View Answer
12. Which of the following is a remote Trojan?
a) Troya
b) DaCryptic
c) BankerA
d) Game-Troj

 Answer: b
Explanation: Using backdoors hackers can breach computer security mechanism
for accessing the computer or its information. This type of code usually comes
attached with Trojans.

 Answer: c
Explanation: A backdoor may be a hidden part of a program, a separate infected
program a Trojan in disguise of an executable or code in the firmware of any
system’s hardware.
 Answer: d
Explanation: Cyber-criminals use backdoors as a means through which they can
bypassed security postures untraceable. They may be a hidden part of a program,
a separate infected program a Trojan in disguise of an executable or code in the
firmware of any system’s hardware.
 Answer: b
Explanation: Backdoor trojans can cause huge damage as this is a method used
by hackers to breach computer security mechanism. These types of code usually
come attached with Trojans programs and can steal your personal data.
 Answer: b
Explanation: Hackers take the help of backdoor to breach security mechanism &
bypassed for stealing different types of information from the target system. The
threat of backdoors started when multiuser & networked OS became widely
accepted.
 Answer: d
Explanation: Trapdoors popularly known as backdoors are used my cyber-criminals
as a method in which a system’s security methods can be bypassed untraceable.
 Answer: c
Explanation: Beast is a powerful RAT build using the language Delphi 7. One
special feature of Beast is that it can help attackers to create all types of Trojans &
it has capabilities of multiple Trojan types.
 Answer: a
Explanation: Trojan is a small malicious program that runs hidden on the infected
system. They are created with the intent and they infected the system by
misleading the user. Troya is a remote Trojan that works remotely for its creator.

You might also like