Taken from Cert-PMP4ED
Related Exam: PMI Cert-PMP4ED PMCert: Project Management Professional Fourth Edition
Item Number: Cert-PMP4ED.4.6.4
The total budgeted cost for your project is $150,000, and you have spent $110,000 to date. You do an Earned Value Analysis and find that the CPI and SPI as of today are 0.91and 0.67, respectively, and the Earned Value (EV), is $100,000. While analyzing past performance, you also find that the original assumptions used to make project estimates were fundamentally flawed. What would be your forecast for total project costs at this stage?
Previous question and answer:
Taken from Cert-CISSP
Related Exam: ISC2 Cert-CISSP SecurityCert: CISSP
Item Number: Cert-CISSP.4.3.29
Which statement correctly describes a Trojan horse?
- A Trojan horse is a malware that is disguised as a useful utility but is embedded with malicious code. When the disguised utility is run, the Trojan horse carries out malicious operations in the background and provides the useful utility on the front end. Trojan horses use covert channels to carry out malicious operations. Malicious activities may include deleting system files or planting a backdoor into a system for later access. Trojan horses are typically installed as a rogue application in the background to avoid suspicion by the user.
A Trojan horse is not a social engineering technique. Social engineering involves tricking another person into sharing confidential information by posing as an authorized individual. Social engineering is a non-technical intrusion that relies heavily on human interaction and typically involves tricking other people into break normal security procedures.
To be executed, a Trojan horse does not depend on other application programs. A virus is the malicious software (malware) that relies upon other application programs to execute and infect a system. The main criterion for classifying a piece of executable code as a virus is that it spreads itself through applications running on a host system. A virus infects an application by replicating itself.
A Trojan horse does not modify the IP address in an IP packet to imitate an authorized source. IP spoofing refers to modification of a source IP address in an IP datagram to imitate the IP address of the packet originating from an authorized source. This results in the target computer setting up communication with the attacker's computer. This process provides access to restricted resources in the target computer. In a spoofing attack, which is also referred to as a masquerading attack, a person or program is able to masquerade successfully as another person or program. A man-in-the-middle attack is an example of a spoofing as well as a session hijacking attack. Other types of spoofing attacks are e-mail spoofing and Web spoofing.
- CISSP Certification All-In-One Exam Guide, Chapter 11: Application Security, Patch Management, Attacks, pp. 1031-1035