Which type of malware is characterized by embedding itself inside the host file it infects?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which type of malware is characterized by embedding itself inside the host file it infects?

Explanation:
This question tests how some malware hides by placing itself inside the host file’s own structure. A cavity virus specifically inserts its code into the unused space—cavities—inside a file rather than overwriting existing code or relying on external payloads. By living in those gaps, the main part of the host file can appear unchanged, while the malicious code is concealed within the file’s internal layout. This makes detection trickier since the file’s visible content remains intact, and the infection is embedded inside the file itself. Other infection methods work differently: macro viruses embed their code in document macros, polymorphic viruses continually mutate their appearance to evade signature-based detection, and Trojan horses disguise malicious software as something harmless. Since the key trait described is embedding inside the host file’s unused space, a cavity virus is the best match.

This question tests how some malware hides by placing itself inside the host file’s own structure. A cavity virus specifically inserts its code into the unused space—cavities—inside a file rather than overwriting existing code or relying on external payloads. By living in those gaps, the main part of the host file can appear unchanged, while the malicious code is concealed within the file’s internal layout. This makes detection trickier since the file’s visible content remains intact, and the infection is embedded inside the file itself.

Other infection methods work differently: macro viruses embed their code in document macros, polymorphic viruses continually mutate their appearance to evade signature-based detection, and Trojan horses disguise malicious software as something harmless. Since the key trait described is embedding inside the host file’s unused space, a cavity virus is the best match.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy