Hello and welcome to our community! Is this your first visit?
Register
Enjoy an ad free experience by logging in. Not a member yet? Register.
Results 1 to 6 of 6
  1. #1
    Senior Coder NancyJ's Avatar
    Join Date
    Feb 2005
    Location
    Bradford, UK
    Posts
    3,174
    Thanks
    19
    Thanked 66 Times in 65 Posts

    trojans and worms

    I had this question on an exam and I was stumped - i've already submitted my answers but this really got me. Wondered if anyone could help.

    Which one of the following statements is NOT true.

    A. Trojan Horses do not replicate
    B. Trojan Horses comprise executable code hidden inside another program
    C. Worms are self contained programs with the ability to propogate
    D. Worms can be used for denial of service attacks
    E. Worms can propogate over networks
    F. Trojan horses may create trap door granting administrative access to a server.

    Now IMO they're all true... any thoughts?

  • #2
    Senior Coder JamieR's Avatar
    Join Date
    Oct 2004
    Location
    United Kingdom
    Posts
    3,161
    Thanks
    0
    Thanked 5 Times in 5 Posts
    Erm I think...

    A. Trojan Horses do not replicate - TRUE
    B. Trojan Horses comprise executable code hidden inside another program - NOT SURE..Trojans are usually single exe files which has all their code inside.
    C. Worms are self contained programs with the ability to propogate - Worms do propogate, that's why they are called worms IMO..Worms usually are single file execs, however they do download other files off the internet.
    D. Worms can be used for denial of service attacks - TRUE
    E. Worms can propogate over networks - TRUE
    F. Trojan horses may create trap door granting administrative access to a server. TRUE - THEY CAN OPEN A BACKDOOR ON A COMPUTER AND ALLOW UNAUTHORIZED ACCESS

    I think B's the odd one out seeing as trojans have to be downloaded or accquired by the user to be run, they also usually come as standalone EXE files. Some works however in an attempt to spread append their code to other EXEs.

    hth

  • #3
    Senior Coder NancyJ's Avatar
    Join Date
    Feb 2005
    Location
    Bradford, UK
    Posts
    3,174
    Thanks
    19
    Thanked 66 Times in 65 Posts
    See heres the thing, the answers arent actually in any of our course notes, they're part of the 'self initiated learning' crap, which basically means google, and I've found evidence for all of them...

  • #4
    Senior Coder JamieR's Avatar
    Join Date
    Oct 2004
    Location
    United Kingdom
    Posts
    3,161
    Thanks
    0
    Thanked 5 Times in 5 Posts
    Ah right, what qualification are you studying for?

  • #5
    Senior Coder NancyJ's Avatar
    Join Date
    Feb 2005
    Location
    Bradford, UK
    Posts
    3,174
    Thanks
    19
    Thanked 66 Times in 65 Posts
    Its an OU short course (2 years if you do each module separately) in Web Apps Development, I know a lot of it already, mostly doing it for the more 'hard core' server admin stuff. I'm aiming high but if I want to be able to replace him I need to know a lot more about running our servers

  • #6
    Regular Coder Lerura's Avatar
    Join Date
    Aug 2005
    Location
    Denmark
    Posts
    946
    Thanks
    0
    Thanked 129 Times in 128 Posts
    Quote Originally Posted by weazel
    B. Trojan Horses comprise executable code hidden inside another program - NOT SURE..Trojans are usually single exe files which has all their code inside.
    B: is true.
    They are called trojans because they are hidden inside other programs.
    Just as the Greeks was hidden inside the wooden "Trojan Horse"


    some of them extracts itself to a file when the containing file is executed.
    and then executes that file.

    Others are run from inside the containing file


  •  

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •