What type of attacks occurs when a rogue application has been planted - ProProfs Discuss
Topics
Products
Follow Us:

What type of attacks occurs when a rogue application has been planted on an unsuspecting users workstation?



A. Social Engineering attacks
B. Logical attacks
C. Physical attacks
D. Trojan Horse attacks
E. None of the Above

This question is part of

CompTIA Security+ Practice Exam (1)
Asked by Atkins, Last updated: Jul 01, 2020

+ Answer
Request

1 Answer

John Smith

John Smith

Answered Sep 08, 2016

Trojan horse attacks-trojan horse attacks - this attack involves a rogue, trojan horse application that has been planted on an unsuspecting users workstation. the trojan horse waits until the user submits a valid pin from a trusted application, thus enabling usage of the private key, and then asks the smartcard to digitally sign some rogue data. the operation completes but the user never knows that their private key was just used against their will. physical attacks involve physical access to hardware such as a network cable or keyboard. social engineering attacks are based on taking advantage of human interaction rather than technology itself. (frequently, social engineering attacks dont even require access to a computer.) there is no such thing as a logical attack, although many attacks do involve the use of logic to figure out how an application works and where its security vulnerabilities may be.
 

Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer

Email Sent
We have sent an email to your address "" with instructions to reset your password.