nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #16

CERTIFIED-IN-CYBERSECURITY Question #16: Real Exam Question with Answer & Explanation

The correct answer is C: Trojans. Trojans are a type of software that appears legitimate but has hidden malicious functions that evade security mechanisms, typically by exploiting legitimate authorizations of the user that invokes the program. Rootkits try to maintain privilege-level access while concealing malic

Security Principles

Question

Which type of attack embeds malicious payload inside a reputable or trusted software?

Options

  • ARootkits
  • BPhishing
  • CTrojans
  • DCross-Site Scripting

Explanation

Trojans are a type of software that appears legitimate but has hidden malicious functions that evade security mechanisms, typically by exploiting legitimate authorizations of the user that invokes the program. Rootkits try to maintain privilege-level access while concealing malicious activity. They often replace system files, so they are activated when the system is restarted. Trojans often install Rootkits, but Rootkits are not the Trojans themselves). Phishing typically tries to redirect the user to another website. Cross-site scripting attempts to inject malicious executable code into a website.

Topics

#Malware#Trojan#Cyber attacks#Threat types

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions