ExamGecko
Question list
Search
Search

Question 28 - ICS-SCADA Cyber Security discussion

Report
Export

What step of the malware infection installs the malware on the target?

A.
Drive-by
Answers
A.
Drive-by
B.
Init
Answers
B.
Init
C.
Dropper
Answers
C.
Dropper
D.
Stager
Answers
D.
Stager
Suggested answer: C

Explanation:

The term 'Dropper' in cybersecurity refers to a small piece of software used in malware deployment that is designed to install or 'drop' malware (like viruses, ransomware, spyware) onto the target system.

The Dropper itself is not typically malicious in behavior; however, it is used as a vehicle to install malware that will perform malicious activities without detection.

During the infection process, the Dropper is usually the first executable that runs on a system. It then unpacks or downloads additional malicious components onto the system.

Reference

Common Malware Enumeration (CME): http://cme.mitre.org

Microsoft Malware Protection Center: https://www.microsoft.com/en-us/wdsi

asked 18/09/2024
Piroon Dechates
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first