Malware Analysis

Malware Analysis

University

12 Qs

quiz-placeholder

Similar activities

C++ Knowledge Based Quiz I = IA

C++ Knowledge Based Quiz I = IA

University

15 Qs

W4 - Quiz on Representing and Sharing Content Using Technology

W4 - Quiz on Representing and Sharing Content Using Technology

University

15 Qs

metal cutting engineering principles

metal cutting engineering principles

University

13 Qs

Software engineering

Software engineering

University

15 Qs

Blooms Taxonomy

Blooms Taxonomy

3rd Grade - University

10 Qs

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

10 Qs

Online Learning

Online Learning

University

10 Qs

A test of CALL (computer assisted language learning )

A test of CALL (computer assisted language learning )

University - Professional Development

15 Qs

Malware Analysis

Malware Analysis

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Jason Webb

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IDA Pro and Ghidra are tools associated with which stage of malware analysis?

Automated Analysis

Static Analysis

Dynamic Analysis

Manual Code Reversing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evaluating malware by examining it without executing it is what type of analysis?

Sandboxing

Static Analysis

Dynamic Analysis

Network Forensics

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following tools monitor and capture the Windows file system, registry, and process activity in real time.

Fiddler

Process Monitor

Process Explorer

Process Hacker

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following analysis tools will NOT identify file header information (e.g. Magic bytes, signatures etc..)?

PEStudio

Dependency Walker

HxD

ExeInfo PE

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which tools can aid in identifying command and control traffic from live malware samples? (Select all that apply)

IDA Pro

TCPDump

Fiddler

Wireshark

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which analysis tool can best aid in identifying malware persistence mechanisms?

Regshot

Wireshark

Process Explorer

Autoruns

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques are NOT associated with Fileless malware?

memory injection

windows manipulation

script based

code obfuscation

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?