The files in James's computer were found spreading within the device without any human action. As an engineer, you were requested to identify the problem and help James resolve it. During file code inspection, you noticed that certain types of files in the computer have similar codes. You found that the problem is coming from a set of codes that are not part of the actual files, appended at the bottom of the file. You also noticed a transfer control code written at the beginning of the files giving control to the code at the bottom of the file. Which type of infection is this a characteristic of? This is a typical characteristic of a spyware infection in the endpoint device. This is a typical characteristic of an endpoint device infected with a file-based virus attack. This is a typical characteristic exhibited by files attacked by ransomware in the device. This is a typical characteristic of files infected by keystrokes in an endpoint.