Security+ Question of the Week: Trojan Horse

securityQOW02

What level of privileges does a Trojan horse have in most corporate network environments?

A. Administrative
B. Normal user
C. System
D. No access

QuestionFillBox

The correct answer is B.

Domain: 3.1. A Trojan horse is a method of delivery for malicious code. When a user accesses/opens/runs a Trojan horse, the malicious payload is delivered. Because it is delivered underneath the privileges of the user, the user’s privileges are what the delivered malware typically inherits. Since the most common user is that of a normal user, that is the most common level of privilege a Trojan horse-delivered malware obtains.

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

In this article

Join the Conversation