What level of privileges does a Trojan horse have in most corporate network environments?
B. Normal user
D. No access
The correct answer is B.
Domain: 3.1. A Trojan horse is a method of delivery for malicious code. When a user accesses/opens/runs a Trojan horse, the malicious payload is delivered. Because it is delivered underneath the privileges of the user, the user’s privileges are what the delivered malware typically inherits. Since the most common user is that of a normal user, that is the most common level of privilege a Trojan horse-delivered malware obtains.