Q: 17
[Introduction to Incident Handling and Response]
A user downloaded what appears to be genuine software. Unknown to her, when she installed the
application, it executed code that provided an unauthorized remote attacker access to her computer.
What type of malicious threat displays this characteristic?
Options
Discussion
B tbh, fits the textbook Trojan scenario since user thinks it’s legit but gets compromised. If the question said it ALSO installed remote admin tools by itself, maybe A could be considered, but here it’s classic Trojan tricks.
Its B for sure since the key thing is the software looked legit but was actually hiding something malicious. If the question asked for how the attacker gains access (like remote control vs just stealing info), would that change the answer to A instead?
Be respectful. No spam.