You are training the employees at Crucial Technologies to recognize different types of malware. You want them to be cautious before running any type of executable and of any email attachments because it might not be what it appears. You want them to be aware that anything could be disguised and actually be malware. What type of malware would you be training them on?
Correct Incorrect Unanswered Report Issue Answer Description
The answer is a Trojan or Trojan Horse. A trojan is a form of malware that attempts to get a user to interact with it by being disguised as something legitimate such as an email attachment or program. The other choices are other forms of malware that infiltrate a system in a different way.
Wikipedia
In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.Trojans are generally spread by some form of social engineering. For example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on a fake advertisement on social media or anywhere else. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller who can then have unauthorized access to the affected computer. Ransomware attacks are often carried out using a Trojan.
Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.
Trojan_horse_(computing) - Wikipedia, the free encyclopedia Subscribe to avoid duplicate questions and track your progress over time