Which method describes attaching a Trojan to a legitimate-looking executable to deceive users?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which method describes attaching a Trojan to a legitimate-looking executable to deceive users?

Explanation:
Wrapping a Trojan inside a legitimate-looking executable is a disguise technique used to fool users. The attacker embeds or bundles malicious code with a trusted program so the file appears harmless, often showing a familiar icon, name, or installer. When a user runs it, the hidden payload activates, making the malware seem like a normal application. This is why the method described is best labeled as a wrapper: it wraps the harmful content inside a believable, trustworthy container to exploit user trust and bypass initial suspicion. The other options reference tools or specific Trojan types rather than the act of concealing a Trojan inside a legitimate executable, or they point to malware aimed at different targets, such as IoT devices, so they don’t fit this particular technique.

Wrapping a Trojan inside a legitimate-looking executable is a disguise technique used to fool users. The attacker embeds or bundles malicious code with a trusted program so the file appears harmless, often showing a familiar icon, name, or installer. When a user runs it, the hidden payload activates, making the malware seem like a normal application. This is why the method described is best labeled as a wrapper: it wraps the harmful content inside a believable, trustworthy container to exploit user trust and bypass initial suspicion. The other options reference tools or specific Trojan types rather than the act of concealing a Trojan inside a legitimate executable, or they point to malware aimed at different targets, such as IoT devices, so they don’t fit this particular technique.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy