CERTIFIED-IN-CYBERSECURITY · Question #176
CERTIFIED-IN-CYBERSECURITY Question #176: Real Exam Question with Answer & Explanation
The correct answer is A: Logic Bomb. A logic bomb is a piece of malicious code intentionally inserted into a software system that triggers a negative function when certain conditions are met. An infection does not typically install logic bombs, they are planted by someone with inside access to the system, such as a
Question
Which of the following is not typically installed as a result of an infection?
Options
- ALogic Bomb
- BKeylogger
- CBackdoor
- DTrojan
Explanation
A logic bomb is a piece of malicious code intentionally inserted into a software system that triggers a negative function when certain conditions are met. An infection does not typically install logic bombs, they are planted by someone with inside access to the system, such as a disgruntled employee (see ISC2 Study Guide, chapter 4, module 2). For example, a programmer might write a logic bomb to delete important files if they ever leave the company. Keyloggers, Trojans, and backdoors are all commonly installed through infections. Keyloggers are designed to record keystrokes to capture sensitive information, Trojans are malware that masquerade as legitimate software, and backdoors provide unauthorized remote access to a computer. Any of these can be installed on a system without the user's knowledge, typically through phishing attacks, malicious downloads, or the exploitation of software vulnerabilities.
Topics
Community Discussion
No community discussion yet for this question.