Which spyware copies spyware files from a USB device onto the hard disk without any request or notification and runs in hidden mode?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which spyware copies spyware files from a USB device onto the hard disk without any request or notification and runs in hidden mode?

Explanation:
This describes malware that spreads through a USB device, automatically copying itself onto the host and running without any user prompt or notification while staying hidden. That delivery method and persistence behavior—propagating from a USB and operating covertly—are the hallmark of USB-based spyware. The other options focus on different functions (capturing audio or video) or reference a brand name that doesn’t inherently denote USB propagation or stealth persistence. So the scenario best matches USB Spyware, which is built to move from a USB to the hard disk and run in hidden mode without user awareness.

This describes malware that spreads through a USB device, automatically copying itself onto the host and running without any user prompt or notification while staying hidden. That delivery method and persistence behavior—propagating from a USB and operating covertly—are the hallmark of USB-based spyware. The other options focus on different functions (capturing audio or video) or reference a brand name that doesn’t inherently denote USB propagation or stealth persistence. So the scenario best matches USB Spyware, which is built to move from a USB to the hard disk and run in hidden mode without user awareness.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy