Which malware inserts itself into a file or executable and spreads to other systems?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which malware inserts itself into a file or executable and spreads to other systems?

Explanation:
Infection by embedding into a program and spreading via infected files is what viruses do. A virus attaches itself to a legitimate file or executable, and when that file is run, the virus activates and copies itself into other files or programs on the same system, creating more infected hosts. This reliance on a host file and the act of propagating through those files is what sets viruses apart. Worms spread across networks on their own by exploiting vulnerabilities and don’t need a host file. Trojan horses disguise themselves as harmless software but don’t self-replicate. Spyware’s goal is covert data collection, not automatic file infection or propagation.

Infection by embedding into a program and spreading via infected files is what viruses do. A virus attaches itself to a legitimate file or executable, and when that file is run, the virus activates and copies itself into other files or programs on the same system, creating more infected hosts. This reliance on a host file and the act of propagating through those files is what sets viruses apart.

Worms spread across networks on their own by exploiting vulnerabilities and don’t need a host file. Trojan horses disguise themselves as harmless software but don’t self-replicate. Spyware’s goal is covert data collection, not automatic file infection or propagation.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy