Prepare for the Ethical Hacking Essentials Test. Study with flashcards and multiple-choice questions, each exam includes hints and explanations. Get ready to ace your certification exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which virus type primarily affects executable files and can disguise itself as legitimate software?

  1. Macro virus

  2. Trojan horse

  3. Worm

  4. File infector virus

The correct answer is: File infector virus

The answer is accurate because a file infector virus specifically targets executable files (.exe files) and can embed itself within these files. By doing so, it can evade detection and appear legitimate to users, making it more likely for someone to run the infected software without realizing its malicious content. Once executed, the virus can replicate and spread to other executable files on the system or through shared networks. Understanding this concept highlights the operational mechanism of file infector viruses, which distinguishes them from other types of malicious software. For example, a macro virus typically affects documents like those created in word processing software and relies on macros in applications to execute. A Trojan horse, while it can disguise itself as legitimate software, usually operates by tricking the user into downloading or executing it, rather than infecting files directly like a file infector virus does. Similarly, worms are standalone malware that replicate themselves across networks, often without the need to attach to executable files. Therefore, the specific nature of the file infector virus makes it the correct choice in this context.