Which attack type occurs when attackers tamper with hardware or software prior to installation?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which attack type occurs when attackers tamper with hardware or software prior to installation?

Explanation:
Tampering before installation is a distribution (supply chain) attack. The attacker targets the delivery path—hardware or software—so the product arrives compromised. This means the malicious code, backdoor, or faulty firmware is already present when the user installs or uses it, making detection much harder because the trustworthiness of the supply chain is broken at the source. Examples include trojanized software installers, tampered firmware updates, or counterfeit hardware with hidden malicious components. The other terms describe different contexts or threats and don’t specifically capture the idea of altering something during distribution before it’s installed.

Tampering before installation is a distribution (supply chain) attack. The attacker targets the delivery path—hardware or software—so the product arrives compromised. This means the malicious code, backdoor, or faulty firmware is already present when the user installs or uses it, making detection much harder because the trustworthiness of the supply chain is broken at the source. Examples include trojanized software installers, tampered firmware updates, or counterfeit hardware with hidden malicious components. The other terms describe different contexts or threats and don’t specifically capture the idea of altering something during distribution before it’s installed.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy