Question

A security auditor is performing a vulnerability scan to find out if mobile applications used in...

A security auditor is performing a vulnerability scan to find out if mobile applications used in the organization are secure. The auditor discovers that one application has been accessed remotely with no legitimate account credentials. After investigating, it seems the application has allowed has allowed some users to bypass authentication of that application. Which of the following types of malware allow such a compromise to take place? (Select TWO).

  • RAT  

  • Ransonware

  • Worm

  • Trojan

  • Backdoor

0 0
Add a comment Improve this question Transcribed image text
✔ Recommended Answer
Answer #1

The answer would be RAT ,i.e. Remote Access Trojan & Backdoor.

Remote Access Trojan, as the name suggests is a malware that controls the system through a remote network connection. Similarly, the Backdoor is a malicious program that allows the attacker to get 'unauthorized' and 'remote access' to a particular system.

On the other hand, Ransomware does not require a remote access. The attacker blocks the victim's data by encrypting the system's files and asks for ransom to decrypt the files back.

A computer worm also does not need a remote access as it has to use a computer network to replicate itself and move from system to system. It can even spread without any human interaction.

Similarly a trojan does not require remote access to function. The trojan virus which does require remote access are already covered in RAT(Remote Access Trojan).

Add a comment
Know the answer?
Add Answer to:
A security auditor is performing a vulnerability scan to find out if mobile applications used in...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT