exam questions

Exam 220-1002 All Questions

View all questions & answers for the 220-1002 exam

Exam 220-1002 topic 1 question 73 discussion

Actual exam question from CompTIA's 220-1002
Question #: 73
Topic #: 1
[All 220-1002 Questions]

A technician is working on a user's workstation and notices a lot of unknown processes running in the background. The user informs the technician that an application was recently downloaded from the Internet.
Which of the following types of infection does the user MOST likely have?

  • A. Rootkit
  • B. Keylogger
  • C. Trojan
  • D. Ransomware
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
betty_boop
Highly Voted 4 years, 10 months ago
It's a Trojan, not a Rootkit. This question is also on Jason Dion's questions, here's the explanation he gives: OBJ-2.4: A trojan is a type of malware that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network. The most common form of a trojan is a Remote Access Trojan (RAT), which is used to allow an attacker to remotely control a workstation or steal information from it. To operate, a trojan will create numerous processes that run in the background of the system.
upvoted 48 times
jmz
4 years, 10 months ago
by the word "unknown processes" meaning disguised OS functions while trojan was visible in the computer so for me its rootkit
upvoted 3 times
DarkHorseSki
4 years, 7 months ago
Trojans can launch their payloads disguised too. Rootkit's typically are NOT visible in the way described.
upvoted 2 times
...
...
Bobo55
4 years, 3 months ago
Additionally, a rootkit will not typically be evident via task manager or through running processes as it is at the kernel level.
upvoted 6 times
...
Rangel
3 years, 8 months ago
Rootkit Gains administrator access (known as root access in Linux) to the operating system. Check for unknown processes running to see if a rootkit is installed. i think its a rootkit 100 percent
upvoted 1 times
maw619
3 years, 7 months ago
shut up
upvoted 4 times
notarobot4296
3 years, 6 months ago
https://youtu.be/WrkIR70soxM
upvoted 1 times
...
...
AOK223
3 years, 8 months ago
Just based on processes? Boop just gave the definition of Trojan "a trojan will create numerous processes that run in the background system." Rootkits you often cannot detect.
upvoted 5 times
Rangel
3 years, 8 months ago
She gave a lot of info ,but its more like security+ ,i think a+ requires most basic concepts, however she is right
upvoted 1 times
maw619
3 years, 7 months ago
Boop is referencing a Comptia 1002 course that is 100% related to this question. Again, shut up.
upvoted 5 times
...
...
...
sage888888888123
2 years, 10 months ago
"I think its a rootkit 100 percent" You can't think something is correct and be 100% certain about it but the correct answer is trojan. If you also listen to messer's videos, he explains how trojans also need someone to allow them to get into the system itself. Meanwhile, worms self replicate by themselves without any user assistance.
upvoted 1 times
...
...
mikey6567
3 years, 6 months ago
Alright folks, the key to this question is the software recently downloaded from the internet. This is malware that appears to be a legitimate program. Like soldiers inside a "Trojan" horse.
upvoted 2 times
...
...
DarkHorseSki
Highly Voted 4 years, 7 months ago
This is, LITERALLY, the definition of a Trojan. Now could a Trojan install a rootkit, sure, but there is nothing in the question that demonstrates root/admin type processes being run. It is clear there has been a Trojan, it is not possible to say what sort of payload it has (and that payload could be A, B, or D.)
upvoted 8 times
...
iLikeBeagButt
Most Recent 3 years ago
Selected Answer: C
Why so many comments when the answer is so obvious?
upvoted 1 times
...
ElPato80
3 years, 2 months ago
It is possible the malware got onto the computer via Trojan. However the question tells us that the malware is using up resources by running a lot of processes in the background which is what rootkits do as they might be trying to hide their presence. The trojan does not do that but is rather a tool used to get the rootkit on the users PC. The answer is rootkit. Not Randsomware or Keylogger.
upvoted 1 times
...
kavukkii
3 years, 2 months ago
Selected Answer: C
theres a reason why its called a trojan for a reason, it hides as a nonchalant file with other tasks at hand, rootkits are barely noticable to begin with.
upvoted 1 times
...
doady
3 years, 3 months ago
Selected Answer: C
trojan
upvoted 1 times
...
syougun200x
3 years, 3 months ago
Seems trojan is the answer. Rootkit is a set of software the question asks the type of infection.
upvoted 1 times
...
[Removed]
3 years, 6 months ago
Ok, this is coming from someone that's been using Trojans since BackOrfice2k and SubSeven days(google those)lol Trojan/RAT A trojan is a client/server architecture software(its a 2 pieces of software). The victim/target is infected with the server which sits silently on the O/S, usually starts up as a service or an executable remains hidden and is lightweight. Server then opens a backdoor(a layer 4) TCP port on the victims machine. This server can be designed in way to brute force open a port on HIPS(host based firewalls etc)(windows firewall for example). Once the server opens this port on victims node, it listens to the socket(IP:port) on the local system(victim). The client side of the trojan controlled by the attacker, makes connection to the server. Once the connection is established the client proceeds with sending commands to server to perform action on the local infected machine. Creating Trojan was part of my dissertation back in 2007. In nutshell that is what a Trojan or RAT does!
upvoted 2 times
...
blacknwhite
3 years, 7 months ago
Answer from Udemy for same type of question, Udemy answer was Trojan, and explanation for rootkit is not that easy to notice and view.
upvoted 1 times
...
SamuelSami
3 years, 8 months ago
Rootkit is a term applied to a type of malware that is designed to infect a target PC and allow an attacker to install a set of tools that grant him persistent remote access to the computer. ... In recent years, a new class of mobile rootkits have emerged to attack smartphones, specifically Android devices.
upvoted 1 times
...
Petter07
3 years, 9 months ago
A. Rootkit is correct. Question: "...notices a lot of unknown processes running in the background." Definition: Rootkits are software programs that have the ability to hide from OS, number of processes running on a system that don't show up in Task Manager.
upvoted 1 times
AOK223
3 years, 8 months ago
He literally said there were unknown processes being run. He had to observe this in Task Manager
upvoted 2 times
...
Cyerr
2 years, 11 months ago
you acknowledge that rookits cannot be shown within task manager ("unknown process") and you still say rookits is the answer... stop trying to confuse people idiot. C. Trojan is the answer
upvoted 1 times
...
...
PeterAD
3 years, 10 months ago
I will go for Trojan.... For example, a rootkit can make processes that run but are hidden from Windows Task Manager, registry keys that can't be seen with Regedit, and network connections that are not viewable by Netstat
upvoted 2 times
...
Jack99xx
4 years ago
Rootkit is correct
upvoted 1 times
...
OCD
4 years, 1 month ago
1. Rootkit : Rootkit is a set of application, a type of malware that is designed to infect a target PC and allow an attacker to install a set of tools that grant him persistent remote access to the computer. The malware typically pretended itself as normal files that “hide in plain sight” so your antivirus software overlooks them. It enables administrator-level access to a computer or computer network. The motive is to steal the identity information from your computer, often to gain control of a system. It is difficult to detect and remove, requires the specialized tools to remove. 2. Trojan Horse : Trojan Horse is also a type of malware which uses false and fake name for mislead users from its true intent and executing them. Trojan Horses generally install on the system as legitimate and useful software that can give unauthorized access and control of the system to the hackers. Back orifice, Rootkit and Beast Trojan are some of the common Trojan horse which is more harmful.
upvoted 2 times
...
alaaaboud
4 years, 3 months ago
I don’t know why the argument is undoubtedly that it is Trojan .. This was also one of the most important questions in my exam today
upvoted 1 times
...
YouKownNothingJonSnow
4 years, 4 months ago
"Trojan" has to do with how the malware presents itself to the user. It embeds itself in a program that does something else. A binary that has been infected with a trojan works as intended but does the additional unwanted actions. "Virus.exe" that has been renamed to "calculator.exe" is not a trojan. A calculator program that works that has also been infected, is a trojan. You might never know that you have been infected because the program you ran works as intended. "Rootkit" has to do with where the malware resides on the system. Once the malware code has been run, it infects the most basic parts of the system so that it is always run, even if the system is rebooted or the running malware code is removed. A trojan might not be a rootkit, and a rootkit might not be a trojan. Some malware might be neither. https://security.stackexchange.com/questions/181221/what-exactly-is-the-meaning-of-trojan-and-rootkit
upvoted 2 times
YouKownNothingJonSnow
4 years, 4 months ago
So, I think the right answer is trojan.
upvoted 2 times
...
...
Sammclane
4 years, 9 months ago
Answer is rootkit. Trojan gives access to someone but do run like root does. I have made Trojan myself and know what its capable of.
upvoted 1 times
DarkHorseSki
4 years, 7 months ago
Nothing in the question implies that there is any root control being done by the running processes.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...