In CEH v13 Module 06: Malware Threats, stealth viruses are covered as advanced malware that can evade detection by:
Intercepting system calls related to file access.
Masking their presence in files, memory, or on disk.
Restoring original code temporarily to fool signature-based scanners.
These capabilities allow stealth viruses to:
Avoid detection by antivirus scanners.
Operate undisturbed until triggered.
Option Clarification:
A. Cavity virus: Hides in unused file space but doesn't evade as effectively.
C. File-extension virus: Exploits deceptive file names but is often detected.
D. Macro virus: Targets office documents, not highly evasive.
Correct answer is B. Stealth virus.
[Reference:, Module 06 – Types of Malware → Stealth Techniques, CEH iLabs: Simulating Stealth Malware and Evasion Tactics, , , ]
Submit