ECCouncil 312-50v13 Question Answer
During a simulated attack against a university's IT network in California, ethical hacker Sophia deploys custom malicious code onto one lab workstation. Without requiring further user interaction, she observes the malware automatically copying itself into shared folders and spreading through weak admin credentials. Within a short time, dozens of computers across multiple departments are infected with the same payload, even though only one machine was initially targeted.
Which type of malware is Sophia most likely demonstrating?

