Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 337

Mary Smith

Sat, 01 Nov 2025

CISA—Certified Information Systems Auditor - Part 337

1. Which of the following refers to any program that invites the user to run it but conceals a harmful or malicious payload?

A) virus
B) worm
C) trojan horse
D) spyware
E) rootkits
F) None of the choices.

2. A Trojan horse's payload would almost always take damaging effect immediately.

A) True
B) False
C)
D)



3. Which of the following terms is used more generally for describing concealment routines in a malicious program?

A) virus
B) worm
C) trojan horse
D) spyware
E) rootkits
F) backdoor

4. Which of the following refers to a method of bypassing normal system authentication procedures?

A) virus
B) worm
C) trojan horse
D) spyware
E) rootkits
F) backdoor

5. To install backdoors, hackers generally prefer to use:

A) either Trojan horse or computer worm.
B) either Tripwire or computer virus.
C) either eavedropper or computer worm.
D) either Trojan horse or eavedropper.
E) None of the choices.


1. Right Answer: C
Explanation:

2. Right Answer: B
Explanation: Broadly speaking, a Trojan horse is any program that invites the user to run it, but conceals a harmful or malicious payload. The payload may take effect immediately and can lead to immediate yet undesirable effects, or more commonly it may install further harmful software into the user's system to serve the creator's longer-term goals.

3. Right Answer: E
Explanation: Rootkits can prevent a malicious process from being reported in the process table, or keep its files from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker had gained administrator access. Today, the term is used more generally for concealment routines in a malicious program.

4. Right Answer: F
Explanation: A backdoor is a method of bypassing normal authentication procedures.Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.

5. Right Answer: A
Explanation: A backdoor is a method of bypassing normal authentication procedures.Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.

0 Comments

Leave a comment