
CHFI Module 11 Malware Forensics
Authored by Karen Diggs
Other
University
Used 83+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware testing should be done on what type of system?
investigators computer
standalone computer
any computer
internet capable computer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
IDA Pro is a widely used program for malware disassembly
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You can check the startup folders by using the run command shell:startup
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To examine the start-up process, investigators can check the _______ _______ list for viewing services that start automatically when the system boots.
startup services
Windows services
system logs
Registry log
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Components of malware are dependent upon ______________
The person receiving the malware attack
Both the sender and receiver of the malware attack
The person who authored the malware attack
The type of machine being used
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
The command netstat -an displays all active TCP connections as well as the TCP and UDP ports on which the computer is listening along with addresses and port numbers.
True
False
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Process monitor is an important tool for Dynamic Malware Analysis
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?