Which technique binds a Trojan executable with genuine looking .EXE applications, such as games or office applications?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique binds a Trojan executable with genuine looking .EXE applications, such as games or office applications?

Explanation:
Disguising a Trojan by bundling it inside a legitimate‑looking executable is accomplished with a wrapper. The wrapper carries the malicious payload inside a trusted‑appearing program, such as a game or office app, so when users run what looks like a normal application, the Trojan activates. This technique leverages trust in familiar software to bypass suspicion and some basic defenses. Other options describe different concepts: IoT Trojans target internet‑connected devices rather than Windows executables; a Trojan Horse construction kit is a toolkit for creating Trojans rather than a method of hiding one inside a legitimate app; CleanDroid isn’t the technique used for this disguise.

Disguising a Trojan by bundling it inside a legitimate‑looking executable is accomplished with a wrapper. The wrapper carries the malicious payload inside a trusted‑appearing program, such as a game or office app, so when users run what looks like a normal application, the Trojan activates. This technique leverages trust in familiar software to bypass suspicion and some basic defenses.

Other options describe different concepts: IoT Trojans target internet‑connected devices rather than Windows executables; a Trojan Horse construction kit is a toolkit for creating Trojans rather than a method of hiding one inside a legitimate app; CleanDroid isn’t the technique used for this disguise.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy