Which Trojan starts a VNC server daemon on the infected system, allowing the attacker to connect with a VNC viewer?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which Trojan starts a VNC server daemon on the infected system, allowing the attacker to connect with a VNC viewer?

Explanation:
The concept here is remote graphical control through a backdoor that launches a VNC server on the infected machine. When the Trojan includes a VNC component, it starts a VNC server daemon that binds to a port and waits for connections. The attacker then uses a VNC viewer to connect to that server, giving them full GUI access to the compromised system as if they were sitting in front of it. This behavior is exactly what defines a VNC-based Trojan: it creates a persistent, remote-desktop entry point for attacker control. Other types of Trojans—those that rely on HTTP/HTTPS payloads, ICMP-based control, or unrelated tools—do not establish a VNC server to provide GUI access, so they don’t fit the described capability.

The concept here is remote graphical control through a backdoor that launches a VNC server on the infected machine. When the Trojan includes a VNC component, it starts a VNC server daemon that binds to a port and waits for connections. The attacker then uses a VNC viewer to connect to that server, giving them full GUI access to the compromised system as if they were sitting in front of it. This behavior is exactly what defines a VNC-based Trojan: it creates a persistent, remote-desktop entry point for attacker control. Other types of Trojans—those that rely on HTTP/HTTPS payloads, ICMP-based control, or unrelated tools—do not establish a VNC server to provide GUI access, so they don’t fit the described capability.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy