mediummultiple choiceObjective-mapped

An administrator notices that a finance file share remained normal for weeks after a former contractor left the company. This morning, multiple PDFs and spreadsheets were deleted, and a scheduled task created months ago is now executing a script that wipes files in the shared folder. Which malware type is most consistent with this behavior?

Question 1mediummultiple choice
Full question →

An administrator notices that a finance file share remained normal for weeks after a former contractor left the company. This morning, multiple PDFs and spreadsheets were deleted, and a scheduled task created months ago is now executing a script that wipes files in the shared folder. Which malware type is most consistent with this behavior?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Logic bomb triggered by a time or condition after being planted earlier

A logic bomb is the best fit because malicious code was planted earlier and remained dormant until a trigger condition caused it to execute. The scheduled task and delayed destructive action are classic signs of a hidden payload designed to activate later, sometimes after a user departure, date, or system event. The time gap strongly supports this interpretation.

B

Distractor review

Worm that is automatically propagating to other endpoints

Worms focus on self-replication and spread, but the scenario centers on delayed activation and destructive execution on one file share.

C

Distractor review

Spyware that is secretly collecting keystrokes and screenshots

Spyware is designed for covert information gathering, not a delayed file deletion event tied to a trigger.

D

Distractor review

Rootkit that is hiding itself in the kernel to maintain stealth

Rootkits are stealth mechanisms, but the issue described is an activated destructive payload rather than hidden system-level persistence.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Logic bomb triggered by a time or condition after being planted earlier — The correct answer is logic bomb. The defining feature is delayed execution after a planted task or condition remains dormant for some time. In this case, the scheduled task existed for weeks and then activated a script that deleted files, which is very consistent with a malicious payload waiting for a trigger. Logic bombs are often associated with insider threats because they can be difficult to notice until the condition is met. Why others are wrong: A worm would be expected to spread across hosts rather than activate a delayed wipe on one shared folder. Spyware is focused on covert data collection, not destructive deletion. A rootkit is used to hide malware or maintain persistence, but the scenario describes a timed trigger and payload execution, not kernel-level concealment.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.