PrepAway - Latest Free Exam Questions & Answers

What type of attacks occurs when a rogue application has been planted on an unsuspecting user’s workstation?

What type of attacks occurs when a rogue application has been planted on an unsuspecting user’s
workstation?

PrepAway - Latest Free Exam Questions & Answers

A.
Physical attacks

B.
Logical attacks

C.
Trojan Horse attacks

D.
Social Engineering attacks

Explanation:
Trojan Horse attacks – This attack involves a rogue, Trojan horse application that has been planted
on an unsuspecting user’s workstation. The Trojan horse waits until the user submits a valid PIN from
a trusted application, thus enabling usage of the private key, and then asks the smartcard to digitally
sign some rogue data. The operation completes but the user never knows that their private key was
just used against their will.


Leave a Reply