Heather used a program hidden inside a legitimate program to gain remote access. What type of malware is she using?

Prepare for the EC-Council Certified Ethical Hacker (CEH) Exam. Use flashcards and multiple-choice questions with hints and explanations. Enhance your cyber security knowledge and get ready for the exam!

Multiple Choice

Heather used a program hidden inside a legitimate program to gain remote access. What type of malware is she using?

Explanation:
A Trojan horse. It hides a malicious payload inside what looks like legitimate software, so when Heather runs the program it installs a backdoor or remote-access capability for an attacker. This deceptive delivery method is what defines a Trojan: it doesn’t self-replicate like a worm, and it isn’t designed to encrypt data for ransom like ransomware, nor does it trigger on a specific condition like a logic bomb.

A Trojan horse. It hides a malicious payload inside what looks like legitimate software, so when Heather runs the program it installs a backdoor or remote-access capability for an attacker. This deceptive delivery method is what defines a Trojan: it doesn’t self-replicate like a worm, and it isn’t designed to encrypt data for ransom like ransomware, nor does it trigger on a specific condition like a logic bomb.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy