Which Trojan type infects a computer by randomly deleting files, folders, and registry entries, often causing OS failure?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which Trojan type infects a computer by randomly deleting files, folders, and registry entries, often causing OS failure?

Explanation:
Destructive Trojans are malware designed to damage or destroy data and system functionality. Their payload targets critical components, not just stealing information or gaining access. When a destructive Trojan deletes files, folders, and even registry entries at random, it can corrupt programs, remove essential system settings, and trigger boot or stability issues. This kind of behavior directly leads to an unstable or nonfunctional operating system, which is exactly what’s described. Other types don’t center on this kind of damage. DDoS Trojans enlist infected systems to flood a target with traffic, aiming to disrupt services rather than corrupt the host’s data. Command Shell Trojans provide a backdoor or remote command access, focusing on control rather than destroying files. IoT Trojans target connected devices to build botnets or exfiltrate data, not specifically to randomly delete system components to crash the OS.

Destructive Trojans are malware designed to damage or destroy data and system functionality. Their payload targets critical components, not just stealing information or gaining access. When a destructive Trojan deletes files, folders, and even registry entries at random, it can corrupt programs, remove essential system settings, and trigger boot or stability issues. This kind of behavior directly leads to an unstable or nonfunctional operating system, which is exactly what’s described.

Other types don’t center on this kind of damage. DDoS Trojans enlist infected systems to flood a target with traffic, aiming to disrupt services rather than corrupt the host’s data. Command Shell Trojans provide a backdoor or remote command access, focusing on control rather than destroying files. IoT Trojans target connected devices to build botnets or exfiltrate data, not specifically to randomly delete system components to crash the OS.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy