{ "query": "Which type of malware disguises itself as a legitimate file, requires the user to execute it, and establishes remote command and control access?", "options": [ { "text": "Worm", "explanation": "A worm self replicates to spread across networks without needing direct user execution.", "correct": false, "selected": false }, { "text": "Trojan horse", "explanation": "Malware that masquerades as legitimate software to trick a user into running it and often enables remote control.", "correct": true, "selected": false }, { "text": "Ransomware", "explanation": "Malware that encrypts files and demands payment to restore access.", "correct": false, "selected": false } ], "answer": "

The correct answer is Trojan horse.

A Trojan horse masquerades as a legitimate file or program and requires a user to execute it. After execution it commonly installs backdoors or other components that give the attacker remote command and control access to the compromised system.

Worm is incorrect because a Worm self replicates and spreads across networks without requiring a user to run a disguised file. Worms rely on automatic propagation rather than on tricking a user into execution.

Ransomware is incorrect because Ransomware primarily encrypts or locks data to extort payment from victims. Although ransomware can be delivered by a trojan style installer, its defining behavior is data encryption for ransom rather than providing remote command and control access.

", "batch_id": "217", "answerCode": "2", "type": "multiple-choice", "originalQuery": "Lee, an employee of a law firm, receives an email with an attachment \"Court_Notice_09082020.zip\". There is a file inside the archive \"Court_Notice_09082020.zip.exe\". Alex does not notice that this is an executable file and runs it. After that, a window appears with the notification \"This word document is corrupt\" and at the same time, malware copies data to APPDATA\\local directory takes place in the background and begins to beacon to a C2 server to download additional malicious binaries. What type of malware has Lee encountered?", "originalOptions": "A. Macro Virus
B. Worm
C. Trojan
D. Key-Logger", "domain": "Reconnaissance Techniques for Ethical Hacking", "hasImage": false, "queryImage": "", "queryImages": [], "allImages": [], "hasAnyImage": false, "deprecatedReference": false, "deprecatedMatches": {}, "hasPre": false, "qid": "683s", "tip": "

When distinguishing malware types focus on the defining behavior. Check if it requires user execution, if it self replicates, or if it encrypts data for ransom. That approach makes elimination faster on exam questions.

", "references": [ "https://csrc.nist.gov/glossary/term/trojan_horse", "https://learn.microsoft.com/en-us/windows/security/threat-protection/intelligence/malware-types", "https://www.cisa.gov/stopransomware/what-is-ransomware" ], "video_url": "https://certificationation.com/videos/others/eccouncil/ethical-hacker/eccouncil-email-with-an-attachment-court-notice-09082020-zip-exam-683.html", "url": "https://certificationation.com/questions/others/eccouncil/ethical-hacker/eccouncil-email-with-an-attachment-court-notice-09082020-zip-exam-683.html" }