CompTIA ITF+ Practice Test 2025 - Free CompTIA ITF+ Practice Questions and Study Guide

Question: 1 / 400

Which type of malware disguises itself as legitimate software?

Adware

Rootkit

Spyware

Trojan Horse

The correct answer is Trojan Horse. This type of malware masquerades as a legitimate or desirable application to deceive users into downloading or executing it. Once installed, a Trojan Horse can perform various malicious activities, such as stealing data, creating backdoors for further attacks, or allowing remote access to an attacker. The effectiveness of a Trojan Horse lies in its ability to convince users that it is safe and useful, which is why it often goes undetected until after it has caused harm.

In contrast, adware is designed primarily to deliver advertisements and, while it can sometimes have unwanted effects, it does not typically present itself as legitimate software. Rootkits are used to gain unauthorized access to a system while hiding their presence, but they do not often simulate legitimate applications. Spyware, while it collects user data without consent, also does not primarily disguise itself as a legitimate software application in the same way a Trojan does. Thus, the defining characteristic of a Trojan Horse—its deceptive nature—makes it the appropriate choice in this context.

Get further explanation with Examzify DeepDiveBeta
Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy