What is a characteristic of a Trojan horse as it relates to network security?
- An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.
- Extreme quantities of data are sent to a particular network device interface.
- Too much information is destined for a particular memory block, causing additional memory areas to be affected.
- Malware is contained in a seemingly legitimate executable program.
Answers Explanation & Hints:
A Trojan horse carries out malicious operations under the guise of a legitimate program. Denial of service attacks send extreme quantities of data to a particular host or network device interface. Password attacks use electronic dictionaries in an attempt to learn passwords. Buffer overflow attacks exploit memory buffers by sending too much information to a host to render the system inoperable.