Prepare for the Ethical Hacking Essentials Test. Study with flashcards and multiple-choice questions, each exam includes hints and explanations. Get ready to ace your certification exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following malware distribution techniques involves exploiting flaws in browser software to install malware by merely visiting a web page?

  1. Drive-by downloads

  2. Phishing

  3. Ransomware

  4. Worm exploitation

The correct answer is: Drive-by downloads

The technique that involves exploiting flaws in browser software to install malware simply by visiting a web page is known as drive-by downloads. This method does not require any user interaction beyond loading the web page; vulnerabilities in the browser or its plugins are targeted to facilitate the unauthorized download of malicious software. Drive-by downloads often take advantage of unpatched software and can bypass security measures, making them a significant threat in the realm of web security. Users may not even be aware that they have been compromised, as the installation process can occur rapidly and without any visible signs of the attack. In context, other techniques like phishing involve deceptive emails or messages that entice users to click links or provide sensitive information, and ransomware is a type of malware that typically requires user action to be executed, like opening an infected file. Worm exploitation generally refers to self-replicating malware that spreads across networks, which does not specifically rely on web browsers for distribution.