Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which virus type primarily affects executable files and can disguise itself as legitimate software?

  1. Macro virus

  2. Trojan horse

  3. Worm

  4. File infector virus

The correct answer is: File infector virus

The answer is accurate because a file infector virus specifically targets executable files (.exe files) and can embed itself within these files. By doing so, it can evade detection and appear legitimate to users, making it more likely for someone to run the infected software without realizing its malicious content. Once executed, the virus can replicate and spread to other executable files on the system or through shared networks. Understanding this concept highlights the operational mechanism of file infector viruses, which distinguishes them from other types of malicious software. For example, a macro virus typically affects documents like those created in word processing software and relies on macros in applications to execute. A Trojan horse, while it can disguise itself as legitimate software, usually operates by tricking the user into downloading or executing it, rather than infecting files directly like a file infector virus does. Similarly, worms are standalone malware that replicate themselves across networks, often without the need to attach to executable files. Therefore, the specific nature of the file infector virus makes it the correct choice in this context.