________________ attach(es) to files
A. adware
B. Spyware
C. Viruses
D. Worms
A self-replicating malicious code that does not alter files but resides in active memory and duplicates itself, spreads through the infected network automatically and takes advantage of file or information transport features on the system to travel independently is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control the victim's system is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
___________________ record(s) user's typing.
A. Spyware
B. adware
C. Virus
D. Malware
Which of the following is a characteristic of adware?
A. Gathering information
B. Displaying popups
C. Intimidating users
D. Replicating
A malware code that infects computer files, corrupts or deletes the data in them and requires a host file to propagate is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
They type of attack that prevents the authorized users to access networks, systems, or applications by exhausting the network resources and sending illegal requests to an application is known as:
A. Session Hijacking attack
B. Denial of Service attack
C. Man in the Middle attack
D. SQL injection attack
A Malicious code attack using emails is considered as:
A. Malware based attack
B. Email attack
C. Inappropriate usage incident
D. Multiple component attack
In a DDoS attack, attackers first infect multiple systems, which are then used to attack a particular target directly. Those systems are called: A. Honey Pots
B. Relays
C. Zombies
D. Handlers
The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven language, performs real-time traffic analysis and packet logging is known as:
A. Snort
B. Wireshark
C. Nessus
D. SAINT
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 212-89 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.