A user downloads a seemingly harmless PDF file, but upon opening it, the system starts behaving abnormally, and security tools detect unauthorized data exfiltration. What type of attack does this scenario describe?
Correct Answer: Trojan horse attack
Explanation: A Trojan horse is malware disguised as a legitimate file that, once executed, delivers a malicious payload, often leading to data theft or system compromise.
Correct Answer: Trojan horse attack
Explanation: A Trojan horse is malware disguised as a legitimate file that, once executed, delivers a malicious payload, often leading to data theft or system compromise.