Which method describes attaching a Trojan to a legitimate-looking executable to deceive users?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which method describes attaching a Trojan to a legitimate-looking executable to deceive users?

Explanation:
Wrapping a Trojan inside a legitimate-looking executable is a disguise technique used to fool users. The attacker embeds or bundles malicious code with a trusted program so the file appears harmless, often showing a familiar icon, name, or installer. When a user runs it, the hidden payload activates, making the malware seem like a normal application. This is why the method described is best labeled as a wrapper: it wraps the harmful content inside a believable, trustworthy container to exploit user trust and bypass initial suspicion. The other options reference tools or specific Trojan types rather than the act of concealing a Trojan inside a legitimate executable, or they point to malware aimed at different targets, such as IoT devices, so they don’t fit this particular technique.

Wrapping a Trojan inside a legitimate-looking executable is a disguise technique used to fool users. The attacker embeds or bundles malicious code with a trusted program so the file appears harmless, often showing a familiar icon, name, or installer. When a user runs it, the hidden payload activates, making the malware seem like a normal application. This is why the method described is best labeled as a wrapper: it wraps the harmful content inside a believable, trustworthy container to exploit user trust and bypass initial suspicion. The other options reference tools or specific Trojan types rather than the act of concealing a Trojan inside a legitimate executable, or they point to malware aimed at different targets, such as IoT devices, so they don’t fit this particular technique.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy