1.

Backdoors cannot be designed as ______________(a) the hidden part of a program(b) as a part of Trojans(c) embedded code of the firmware(d) embedded with anti-malwareThe question was posed to me in an online quiz.I need to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (d) embedded with anti-malware

The best explanation: Cyber-criminals use BACKDOORS as a means through which they can bypassed security postures UNTRACEABLE. They may be a hidden part of a program, a separate INFECTED program a Trojan in DISGUISE of an executable or code in the firmware of any system’s hardware.



Discussion

No Comment Found

Related InterviewSolutions