Malware Analysis

Malware Analysis

University

12 Qs

quiz-placeholder

Similar activities

Introduction of IOT

Introduction of IOT

University

10 Qs

TECHNOLOGY INTEGRATION

TECHNOLOGY INTEGRATION

University

10 Qs

ITC133 Week 1 - 6 review

ITC133 Week 1 - 6 review

University

10 Qs

Dasar Desain Grafis

Dasar Desain Grafis

1st Grade - University

15 Qs

CHOOSE ME! :)

CHOOSE ME! :)

University

11 Qs

Strategic Planning Analysis Tools and Techniques

Strategic Planning Analysis Tools and Techniques

University - Professional Development

10 Qs

Manufacturing of Brickcs & Categories of Bricks

Manufacturing of Brickcs & Categories of Bricks

12th Grade - University

10 Qs

Product Development

Product Development

University

10 Qs

Malware Analysis

Malware Analysis

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Jason Webb

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IDA Pro and Ghidra are tools associated with which stage of malware analysis?

Automated Analysis

Static Analysis

Dynamic Analysis

Manual Code Reversing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evaluating malware by examining it without executing it is what type of analysis?

Sandboxing

Static Analysis

Dynamic Analysis

Network Forensics

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools monitor and capture the Windows file system, registry, and process activity in real time.

Fiddler

Process Monitor

Process Explorer

Process Hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following analysis tools will NOT identify file header information (e.g. Magic bytes, signatures etc..)?

PEStudio

Dependency Walker

HxD

ExeInfo PE

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which tools can aid in identifying command and control traffic from live malware samples? (Select all that apply)

IDA Pro

TCPDump

Fiddler

Wireshark

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which analysis tool can best aid in identifying malware persistence mechanisms?

Regshot

Wireshark

Process Explorer

Autoruns

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques are NOT associated with Fileless malware?

memory injection

windows manipulation

script based

code obfuscation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?