Difficulty: Easy
Correct Answer: Trojan
Explanation:
Introduction / Context:
Malware is commonly classified by behavior. Self-replication differentiates worms and traditional viruses from Trojans. Recognizing this helps choose appropriate defenses and incident responses.
Given Data / Assumptions:
Concept / Approach:
A Trojan (from “Trojan horse”) masquerades as legitimate software to trick users into running it. Once executed, it may install backdoors, steal data, or change settings, but it does not self-replicate automatically. In contrast, a worm spreads on its own across networks without user action. A “joke program” or “hoax” does not necessarily contain malicious code.
Step-by-Step Solution:
Match the non-replicating behavior to malware taxonomy.Eliminate worm because worms replicate and propagate autonomously.Select Trojan as the accurate category.
Verification / Alternative check:
Security references define Trojans by their lack of self-replication and reliance on social engineering or bundling for distribution.
Why Other Options Are Wrong:
Common Pitfalls:
Confusing Trojans bundled with droppers or downloaders. While a Trojan may fetch other malware, the Trojan itself still lacks autonomous replication.
Final Answer:
Trojan
Discussion & Comments