Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following is a common type of malware that disguises itself as legitimate software?

  1. Trojan Horse

  2. Worm

  3. Ransomware

  4. Spyware

The correct answer is: Trojan Horse

The Trojan Horse is a prevalent type of malware designed to appear as a legitimate or benign application while secretly executing harmful actions. This tactic often exploits user trust; individuals are more likely to download, install, or execute a program that they believe to be useful or familiar. Once activated, a Trojan can perform various malicious activities, such as stealing data, creating a backdoor for other malware, or damaging system functionality. Understanding this type of malware is crucial for cybersecurity, as it highlights the importance of vigilance when downloading software or clicking on links, even when they seem credible. Users often overlook the risks associated with seemingly harmless applications, making education about Trojans particularly important in the fight against cyber threats. Other types of malware, like worms, ransomware, and spyware, have different characteristics and operational methods, focusing more on replication, extortion, or surveillance rather than deception as a legitimate software.