Which of the following are based on malicious code?
Each correct answer represents a complete solution. Choose two.
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
Which of the following statements is true about the difference between worms and Trojan horses?
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?