CHAPTER 10
Trojans and Other Attacks
This chapter includes questions from the following topics:
• Describe malware types and their purpose
• Identify malware deployment methods
• Describe the malware analysis process
• Identify malware countermeasures
• Describe DoS attacks and techniques
• Identify DoS detection and countermeasure actions
• Describe session hijacking and sequence prediction
Every new hobby and activity ends up with a huge learning curve, with all sorts of lingo and terminology to figure out. And, usually, it winds up costing a lot of money. For example, suppose you decide to get into photography. All of a sudden you’re learning about ISO ratings and saturation—and buying insanely expensive cameras and lenses ...
Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.