ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 48 - ECSS discussion

Report
Export

A type of malware allows an attacker to trick the target entity into performing a predefined action, and upon its activation, it grants the attacker unrestricted access to all the data stored on the compromised system.

Which of the following is this type of malware?

A.

Key log ger

Answers
A.

Key log ger

B.

Botnet

Answers
B.

Botnet

C.

Worm

Answers
C.

Worm

D.

Trojan

Answers
D.

Trojan

Suggested answer: D

Explanation:

ATrojan(short for ''Trojan horse'') is one of the most insidious types of malware. Trojans disguise themselves as legitimate software programs, such as a game or utility, while secretly damaging the host device. Unlike viruses and worms, Trojans mainly use social engineering techniques to replicate themselves, fooling victims into downloading and installing them.

EC-Council Certified Security Specialist (E|CSS) course materials and study guide12.

asked 24/10/2024
Madhanraj N
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first