Cybersecurity Final Exam Review

Cybersecurity Final Exam Review

University

20 Qs

quiz-placeholder

Similar activities

Quiz on neural network unit II

Quiz on neural network unit II

University

16 Qs

GIS Unit-1

GIS Unit-1

University

15 Qs

Computer Architecture Unit 3

Computer Architecture Unit 3

University

15 Qs

IT 209

IT 209

University

15 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

PHP First Internal Practical Viva

PHP First Internal Practical Viva

University

20 Qs

Assessment 08

Assessment 08

University

15 Qs

Cybersecurity Final Exam Review

Cybersecurity Final Exam Review

Assessment

Quiz

Computers

University

Hard

Created by

Jandelyn Plane

Used 15+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which should come first in malware analysis - static or dynamic?

static

dynamic

neither - should be done at the same time

they are the same thing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the tools called that obfuscates malware, compresses or encrypts malware and contains anti-analysis features?

wrappers

trojans

packers

none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When doing dynamic malware analysis, it is important to ...

make the environment it is being tested in as "real life" looking as possible

make sure the environment is self contained - is a "host only" machine

both of these

neither of these

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To take the malware and figure out how it was built is called

Dynamic Analysis

Reverse Engineering

Build Wrapping

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Hex Dump?

Removing all negative features of the software

Displaying what exactly is in each byte of the software

Interpreting the characters that make up a compressed file.

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When generating the Hash of a File you are

Determining if it is malicious or not

Determining what is in each of the bytes of the file

Making the file no longer dangerous

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When doing Reverse Engineering - one stage is modeling - this means:

Recreating code that does the same thing but can be controled

Breaking the program down to understand the impact of each part

Comparing the malware operation to other known applications by running them side by side

None of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?