Which Trojan type infects a computer by randomly deleting files, folders, and registry entries, often causing OS failure?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which Trojan type infects a computer by randomly deleting files, folders, and registry entries, often causing OS failure?

Explanation:
Destructive Trojans are malware designed to damage or destroy data and system functionality. Their payload targets critical components, not just stealing information or gaining access. When a destructive Trojan deletes files, folders, and even registry entries at random, it can corrupt programs, remove essential system settings, and trigger boot or stability issues. This kind of behavior directly leads to an unstable or nonfunctional operating system, which is exactly what’s described. Other types don’t center on this kind of damage. DDoS Trojans enlist infected systems to flood a target with traffic, aiming to disrupt services rather than corrupt the host’s data. Command Shell Trojans provide a backdoor or remote command access, focusing on control rather than destroying files. IoT Trojans target connected devices to build botnets or exfiltrate data, not specifically to randomly delete system components to crash the OS.

Destructive Trojans are malware designed to damage or destroy data and system functionality. Their payload targets critical components, not just stealing information or gaining access. When a destructive Trojan deletes files, folders, and even registry entries at random, it can corrupt programs, remove essential system settings, and trigger boot or stability issues. This kind of behavior directly leads to an unstable or nonfunctional operating system, which is exactly what’s described.

Other types don’t center on this kind of damage. DDoS Trojans enlist infected systems to flood a target with traffic, aiming to disrupt services rather than corrupt the host’s data. Command Shell Trojans provide a backdoor or remote command access, focusing on control rather than destroying files. IoT Trojans target connected devices to build botnets or exfiltrate data, not specifically to randomly delete system components to crash the OS.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy