Q: 17
[Introduction to Incident Handling and Response]
A user downloaded what appears to be genuine software. Unknown to her, when she installed the
application, it executed code that provided an unauthorized remote attacker access to her computer.
What type of malicious threat displays this characteristic?
Options
Discussion
B , had something like this in a mock. Trojan is the one that disguises itself as real software and sneaks in malicious code. Virus would spread, backdoor isn’t always disguised. Makes sense right?
Yeah this one's classic Trojan behavior. B
Not C, it's B. Spyware usually just monitors, but here the remote access part matches Trojan behavior pretty clearly I think.
B tbh, fits the textbook Trojan scenario since user thinks it’s legit but gets compromised. If the question said it ALSO installed remote admin tools by itself, maybe A could be considered, but here it’s classic Trojan tricks.
Its B for sure since the key thing is the software looked legit but was actually hiding something malicious. If the question asked for how the attacker gains access (like remote control vs just stealing info), would that change the answer to A instead?
Be respectful. No spam.