PrepAway - Latest Free Exam Questions & Answers

Jesse receives an email with an attachment labeled -Court_Notice_21206.zip-. Inside the zip file is a…

Jesse receives an email with an attachment labeled -Court_Notice_21206.zip-. Inside the zip file is a

file named -Court_Notice_21206.docx.exe- disguised as a word document. Upon execution, a window appears stating, -This word document is corrupt.- In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server

to download additional malicious binaries.

What type of malware has Jesse encountered?

A. Trojan

B. Worm

C. Macro Virus

D. Key-Logger

In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a comput

er by misleading users of its true intent. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.

References:


Leave a Reply