Which virus stores itself with the same filename as the target program file, potentially masquerading as the legitimate program?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which virus stores itself with the same filename as the target program file, potentially masquerading as the legitimate program?

Explanation:
Masquerading by keeping the exact name of the target program is a stealth technique used by a shell virus. It infects a legitimate executable by wrapping around it or embedding itself in the same file while preserving the original filename and extension. Because the file still appears as the trusted program, users (and some security tools) see nothing suspicious when they click to run it. The virus then executes its payload and typically passes control to the original program, making the infection easy to overlook. This fits best because the key idea is the attachment to the host program in a way that preserves its identity, so it looks legitimate even though it’s infected. The concept described does not match a zombie, which refers to a compromised machine controlled remotely rather than a technique for hiding inside a specific file. It also isn’t about simply changing file extensions to mislead users, which is a different approach to disguise. Nor is it about infecting the FAT file system itself, which targets how files are stored rather than how a particular program’s filename is preserved.

Masquerading by keeping the exact name of the target program is a stealth technique used by a shell virus. It infects a legitimate executable by wrapping around it or embedding itself in the same file while preserving the original filename and extension. Because the file still appears as the trusted program, users (and some security tools) see nothing suspicious when they click to run it. The virus then executes its payload and typically passes control to the original program, making the infection easy to overlook.

This fits best because the key idea is the attachment to the host program in a way that preserves its identity, so it looks legitimate even though it’s infected. The concept described does not match a zombie, which refers to a compromised machine controlled remotely rather than a technique for hiding inside a specific file. It also isn’t about simply changing file extensions to mislead users, which is a different approach to disguise. Nor is it about infecting the FAT file system itself, which targets how files are stored rather than how a particular program’s filename is preserved.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy