Malware Analysis

Malware Analysis

University

12 Qs

quiz-placeholder

Similar activities

ITC133 Week 1 - 6 review

ITC133 Week 1 - 6 review

University

10 Qs

12. Quality management

12. Quality management

University

11 Qs

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

10 Qs

W2 - Pedagogies of technology-enhanced learning

W2 - Pedagogies of technology-enhanced learning

University

17 Qs

Amenazas Comunes en Línea

Amenazas Comunes en Línea

University

10 Qs

EDIT 3560 -Week 2 Review

EDIT 3560 -Week 2 Review

University - Professional Development

10 Qs

Segurança na Internet - 2.ºCiclo

Segurança na Internet - 2.ºCiclo

6th Grade - University

14 Qs

TECHNOLOGY INTEGRATION

TECHNOLOGY INTEGRATION

University

10 Qs

Malware Analysis

Malware Analysis

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Jason Webb

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IDA Pro and Ghidra are tools associated with which stage of malware analysis?

Automated Analysis

Static Analysis

Dynamic Analysis

Manual Code Reversing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evaluating malware by examining it without executing it is what type of analysis?

Sandboxing

Static Analysis

Dynamic Analysis

Network Forensics

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools monitor and capture the Windows file system, registry, and process activity in real time.

Fiddler

Process Monitor

Process Explorer

Process Hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following analysis tools will NOT identify file header information (e.g. Magic bytes, signatures etc..)?

PEStudio

Dependency Walker

HxD

ExeInfo PE

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which tools can aid in identifying command and control traffic from live malware samples? (Select all that apply)

IDA Pro

TCPDump

Fiddler

Wireshark

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which analysis tool can best aid in identifying malware persistence mechanisms?

Regshot

Wireshark

Process Explorer

Autoruns

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques are NOT associated with Fileless malware?

memory injection

windows manipulation

script based

code obfuscation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?