Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What technique involves injecting malware into seemingly legitimate websites to trick users?

  1. Phishing

  2. Socially Engineered Click-Jacking

  3. Drive-by Downloads

  4. Cross-site Scripting

The correct answer is: Socially Engineered Click-Jacking

The technique that involves injecting malware into seemingly legitimate websites to trick users is known as socially engineered click-jacking. This method manipulates a user into clicking on something different from what the user perceives, which can result in the unintentional activation of malicious scripts or actions. By crafting a deceptive interface or overlay that disguises the true nature of the action (such as clicking a button that appears safe), attackers can exploit user trust and the regular human behavior of clicking on familiar content. This is a sophisticated form of web-based attack because it relies not only on technical vulnerabilities but also leverages psychological manipulation to deceive users. The attacker may mask the actual link or action, making it appear benign, while the click ultimately leads to harmful consequences, like unwittingly installing malware or providing sensitive information. In contrast, the other options involve different mechanisms of deception or exploitation, such as phishing directed at users through emails, drive-by downloads where malicious code is downloaded automatically without user interaction, and cross-site scripting which aims to execute malicious scripts in a user's browser. These techniques do not specifically focus on the combination of user interface manipulation and social engineering to trick users into executing harmful actions on legitimate sites, which is the hallmark of socially engineered click-jacking.