Which virus type infects Microsoft Word or similar applications by automatically performing a sequence of actions after triggering an application?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which virus type infects Microsoft Word or similar applications by automatically performing a sequence of actions after triggering an application?

Explanation:
Macro viruses specifically exploit the automation features built into Microsoft Word and similar programs. They hide inside documents or templates as macros written in the built‑in scripting language (like VBA). When you open the document or start the application and macros are enabled, the virus runs a predefined sequence of actions automatically. That sequence can include infecting other documents, altering content, or pulling in additional payloads, all without explicit user instruction beyond enabling macros. This makes macro viruses the best fit for the description of “infecting Word or similar apps by automatically performing a sequence of actions after triggering an application.” Other virus types don’t match this behavior as closely: stealth viruses focus on hiding activity, file viruses infect various file types without relying on Office automation, and polymorphic viruses change their code to evade detection rather than capitalize on Office macro automation.

Macro viruses specifically exploit the automation features built into Microsoft Word and similar programs. They hide inside documents or templates as macros written in the built‑in scripting language (like VBA). When you open the document or start the application and macros are enabled, the virus runs a predefined sequence of actions automatically. That sequence can include infecting other documents, altering content, or pulling in additional payloads, all without explicit user instruction beyond enabling macros.

This makes macro viruses the best fit for the description of “infecting Word or similar apps by automatically performing a sequence of actions after triggering an application.” Other virus types don’t match this behavior as closely: stealth viruses focus on hiding activity, file viruses infect various file types without relying on Office automation, and polymorphic viruses change their code to evade detection rather than capitalize on Office macro automation.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy