nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #176

CERTIFIED-IN-CYBERSECURITY Question #176: Real Exam Question with Answer & Explanation

The correct answer is A: Logic Bomb. A logic bomb is a piece of malicious code intentionally inserted into a software system that triggers a negative function when certain conditions are met. An infection does not typically install logic bombs, they are planted by someone with inside access to the system, such as a

Security Principles

Question

Which of the following is not typically installed as a result of an infection?

Options

  • ALogic Bomb
  • BKeylogger
  • CBackdoor
  • DTrojan

Explanation

A logic bomb is a piece of malicious code intentionally inserted into a software system that triggers a negative function when certain conditions are met. An infection does not typically install logic bombs, they are planted by someone with inside access to the system, such as a disgruntled employee (see ISC2 Study Guide, chapter 4, module 2). For example, a programmer might write a logic bomb to delete important files if they ever leave the company. Keyloggers, Trojans, and backdoors are all commonly installed through infections. Keyloggers are designed to record keystrokes to capture sensitive information, Trojans are malware that masquerade as legitimate software, and backdoors provide unauthorized remote access to a computer. Any of these can be installed on a system without the user's knowledge, typically through phishing attacks, malicious downloads, or the exploitation of software vulnerabilities.

Topics

#Malware Types#Cyber Threats#Logic Bomb#Malware Delivery

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions