Prepare for the Ethical Hacking Essentials Test. Dive into flashcards and multiple choice questions, with hints and explanations for each one. Ace your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


How did Mark install malware into the victim’s system?

  1. Through phishing emails

  2. File sharing services

  3. Rogue applications

  4. Social engineering

The correct answer is: File sharing services

The installation of malware through file sharing services is a common method that attackers use to compromise victim systems. This approach involves the use of platforms and applications that allow users to upload and download files. When a victim unknowingly downloads a malicious file disguised as a legitimate file, the malware can be installed on their system. File sharing services can entice users with seemingly harmless or desirable content, such as music, games, or software, making it easy for the malware to be overlooked. Once the file is downloaded and executed, the malware can perform various harmful actions, such as stealing data, encrypting files for ransom, or creating backdoors for future access. While other methods like phishing emails, rogue applications, and social engineering are valid techniques for malware distribution, the answer provided focuses explicitly on the mechanism of file sharing, highlighting its effectiveness and prevalence in cyber attacks.