Which type of Trojan horse security breach uses the computer of the victim as the source device to launch other attacks?

  • Post author:
  • Post category:SEO
  • Post comments:0 Comments
  • Post last modified:March 5, 2024
  • Reading time:1 mins read

Which type of Trojan horse security breach uses the computer of the victim as the source device to launch other attacks?

  • FTP
  • data-sending
  • DoS
  • proxy
Answers Explanation & Hints:

The attacker uses a proxy Trojan horse attack to penetrate one device and then use that device to launch attacks on other devices. The DoS Trojan horse slows or halts network traffic. The FTP trojan horse enables unauthorized file transfer services when port 21 has been compromised. A data-sending Trojan horse transmits data back to the hacker that could include passwords.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 13 – 17: Threats and Attacks Group Exam Answers Full 100%

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments