What type of attacks occurs when a rogue application has been planted - ProProfs Discuss
Topics
Products
Follow Us:

What type of attacks occurs when a rogue application has been planted on an unsuspecting users workstation?



A. Social Engineering attacks
B. Logical attacks
C. Physical attacks
D. Trojan Horse attacks
E. None of the Above

This question is part of Comptia Security+ Practice Exam (1)
Asked by Wyatt Williams, Last updated: Apr 19, 2020

+ Answer
Request

1 Answer

Wyatt Williams

Wyatt Williams

Answered Mar 08, 2018

Trojan Horse attacks

Trojan Horse attacks - This attack involves a rogue, Trojan horse application that has been planted on an unsuspecting users workstation. The Trojan horse waits until the user submits a valid PIN from a trusted application, thus enabling usage of the private key, and then asks the smartcard to digitally sign some rogue data. The operation completes but the user never knows that their private key was just used against their will. Physical attacks involve physical access to hardware such as a network cable or keyboard. Social engineering attacks are based on taking advantage of human interaction rather than technology itself. (Frequently, social engineering attacks dont even require access to a computer.) There is no such thing as a logical attack, although many attacks do involve the use of logic to figure out how an application works and where its security vulnerabilities may be.
 

Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer

Email Sent
We have sent an email to your address "" with instructions to reset your password.