Which technique binds a Trojan executable with genuine looking .EXE applications, such as games or office applications?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which technique binds a Trojan executable with genuine looking .EXE applications, such as games or office applications?

Explanation:
Disguising a Trojan by bundling it inside a legitimate‑looking executable is accomplished with a wrapper. The wrapper carries the malicious payload inside a trusted‑appearing program, such as a game or office app, so when users run what looks like a normal application, the Trojan activates. This technique leverages trust in familiar software to bypass suspicion and some basic defenses. Other options describe different concepts: IoT Trojans target internet‑connected devices rather than Windows executables; a Trojan Horse construction kit is a toolkit for creating Trojans rather than a method of hiding one inside a legitimate app; CleanDroid isn’t the technique used for this disguise.

Disguising a Trojan by bundling it inside a legitimate‑looking executable is accomplished with a wrapper. The wrapper carries the malicious payload inside a trusted‑appearing program, such as a game or office app, so when users run what looks like a normal application, the Trojan activates. This technique leverages trust in familiar software to bypass suspicion and some basic defenses.

Other options describe different concepts: IoT Trojans target internet‑connected devices rather than Windows executables; a Trojan Horse construction kit is a toolkit for creating Trojans rather than a method of hiding one inside a legitimate app; CleanDroid isn’t the technique used for this disguise.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy