Which type of malware exploits vulnerabilities in network communication protocols such as SMB to deliver malicious payloads?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which type of malware exploits vulnerabilities in network communication protocols such as SMB to deliver malicious payloads?

Explanation:
Network-based malware spreads by abusing network services and protocols to deliver payloads. Exploiting vulnerabilities in a protocol like SMB enables remote code execution and rapid propagation across hosts, allowing the malware to move through a network without requiring physical access. For example, SMB flaws have been used in worm-like outbreaks to jump from one Windows machine to another. The other types rely on physical media or targeted hardware rather than exploiting network protocol flaws, so they don’t fit the scenario as well.

Network-based malware spreads by abusing network services and protocols to deliver payloads. Exploiting vulnerabilities in a protocol like SMB enables remote code execution and rapid propagation across hosts, allowing the malware to move through a network without requiring physical access. For example, SMB flaws have been used in worm-like outbreaks to jump from one Windows machine to another. The other types rely on physical media or targeted hardware rather than exploiting network protocol flaws, so they don’t fit the scenario as well.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy