CERTIFIED-IN-CYBERSECURITY · Question #16
CERTIFIED-IN-CYBERSECURITY Question #16: Real Exam Question with Answer & Explanation
The correct answer is C: Trojans. Trojans are a type of software that appears legitimate but has hidden malicious functions that evade security mechanisms, typically by exploiting legitimate authorizations of the user that invokes the program. Rootkits try to maintain privilege-level access while concealing malic
Question
Which type of attack embeds malicious payload inside a reputable or trusted software?
Options
- ARootkits
- BPhishing
- CTrojans
- DCross-Site Scripting
Explanation
Trojans are a type of software that appears legitimate but has hidden malicious functions that evade security mechanisms, typically by exploiting legitimate authorizations of the user that invokes the program. Rootkits try to maintain privilege-level access while concealing malicious activity. They often replace system files, so they are activated when the system is restarted. Trojans often install Rootkits, but Rootkits are not the Trojans themselves). Phishing typically tries to redirect the user to another website. Cross-site scripting attempts to inject malicious executable code into a website.
Topics
Community Discussion
No community discussion yet for this question.