What does malware provide to the attacker on a compromised device?

Prepare for the EC-Council Certified Ethical Hacker (CEH) Exam. Use flashcards and multiple-choice questions with hints and explanations. Enhance your cyber security knowledge and get ready for the exam!

Multiple Choice

What does malware provide to the attacker on a compromised device?

Explanation:
When malware infects a device, its primary aim is to give the attacker a foothold and remote control over that system. It does this by creating a backdoor or remote access mechanism, effectively turning the compromised device into an access point that the attacker can use to issue commands, exfiltrate data, or pivot to other machines. That’s why this option best describes what malware provides to the attacker: ongoing access and control through a direct connection into the victim. The other concepts are defensive or decoy in nature and don’t originate from malware: a firewall is meant to block or limit access, not provide it; a VPN is a legitimate secure tunnel for privacy or remote access but isn’t something malware “provides” to attackers; and a honeypot is a decoy system used to lure attackers, not something malware delivers to enable attacker access.

When malware infects a device, its primary aim is to give the attacker a foothold and remote control over that system. It does this by creating a backdoor or remote access mechanism, effectively turning the compromised device into an access point that the attacker can use to issue commands, exfiltrate data, or pivot to other machines. That’s why this option best describes what malware provides to the attacker: ongoing access and control through a direct connection into the victim.

The other concepts are defensive or decoy in nature and don’t originate from malware: a firewall is meant to block or limit access, not provide it; a VPN is a legitimate secure tunnel for privacy or remote access but isn’t something malware “provides” to attackers; and a honeypot is a decoy system used to lure attackers, not something malware delivers to enable attacker access.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy