Describe how a trojan horse virus works


Problem

A. List the issues that need to be addressed by the security policies.

B. What is a brute force attack?

C. How is spyware used by hackers to steal valuable information?

D. How do hackers use e-mail to attack computer systems?

E. What do hackers do with packet sniffer software?

F. What is IP spoofing?

G. What is a denial-of-service attack?

H. Explain why it is difficult to deal with a stealth virus.

I. Describe how a Trojan horse virus works?

J. What is a computer worm?

K. How do we protect a Web server and a Web browser?

L. List the attacks that can be detected by the IDS.

M. What can IPSec do to keep packet transmission secure?

N. Describe how RADIUS works.

O. When compared with Telnet, what is the advantage of SSH?

P. State the difference between SSH and SSL.

Q. What are the three components involved in an EAP authentication process?

R. Briefly describe three types of firewall mechanisms discussed in this chapter.

S. What are the advantages and disadvantages of a stateful packet inspection firewall?

T. Briefly describe three types of firewall architectures covered in this chapter.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Describe how a trojan horse virus works
Reference No:- TGS03264228

Expected delivery within 24 Hours