1. Right Answer: A,B,C
Explanation: On Linux you have Apache which is supposed to be a safer choice of web service. In fact you have several choices for the Apache/SSL combination, such as theApache-SSL project (www.apache-ssl.org) using third-party SSL patches, or have Apache compiled with the mod_ssl module.
2. Right Answer: A
Explanation: rootkit originally describes those recompiled Unix tools that would hide any trace of the intruder.You can say that the only purpose of rootkit is to hide evidence from system administrators so there is no way to detect malicious special privilege access attempts.
3. Right Answer: A
Explanation: Most trojan horse programs are spread through e-mails. Some earlier trojan horse programs were bundled in Root Kits'. For example, the Linux Root Kit version3 (lrk3) which was released in December 96 had tcp wrapper trojans included and enhanced in the kit. Portable devices that run Linux can also be affected by trojan horse. The Trojan.Linux.JBellz Trojan horse runs as a malformed .mp3 file.'
4. Right Answer: B
Explanation: Most trojan horse programs are spread through e-mails. Some earlier trojan horse programs were bundled in Root Kits'. For example, the Linux Root Kit version3 (lrk3) which was released in December 96 had tcp wrapper trojans included and enhanced in the kit. Portable devices that run Linux can also be affected by trojan horse. The Trojan.Linux.JBellz Trojan horse runs as a malformed .mp3 file.'
5. Right Answer: B
Explanation: Keystroke logging (in the form of spyware) was originally a function of diagnostic tool deployed by software developers for capturing user's keystrokes.This is done for determining the sources of error or for measuring staff productivity.