Malware Analysis: Static Analysis

Malware Analysis: Static Analysis

University

10 Qs

quiz-placeholder

Similar activities

TAC3121-Quiz 6

TAC3121-Quiz 6

University

10 Qs

Cryptocurrency

Cryptocurrency

University

9 Qs

Dynamic Malware Analysis

Dynamic Malware Analysis

University

10 Qs

Final Keamanan Komputer / Sistem Keamanan Jaringan

Final Keamanan Komputer / Sistem Keamanan Jaringan

University

11 Qs

CD QUIZ S5 21-3-2022

CD QUIZ S5 21-3-2022

University

10 Qs

Blockchain Basics: Algorithms

Blockchain Basics: Algorithms

University - Professional Development

9 Qs

Basic Static Analysis Quiz

Basic Static Analysis Quiz

University

10 Qs

Chapter 9

Chapter 9

University

9 Qs

Malware Analysis: Static Analysis

Malware Analysis: Static Analysis

Assessment

Quiz

Computers

University

Medium

Created by

James Anderson

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is NOT used for identifying strings within a malware sample?

Strings

PE Studio

Floss

HashCalc

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hash algorithm is not commonly used to identify malware samples?

MD5

Tiger

SHA256

SHA1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term "Defanged" means

Analyzing the behavior of malware

Making malware harmless so that it is not accidently detonated

Arming malware so that it can be detonated

The process where Anti-Virus software removes malware from a computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The common password used to protect malware samples when archived

qwerty

password

infected

Pa55w0rD!

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do with your virtual machine before detonating malware?

Reboot

Enable Windows Defender

Create a Snapshot

Suspend

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common website used to identify malware using hash values?

viruslists.com

virustotal.com

virussum.com

virusadditions.com

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware developers use encoding schemes such as base64 to do what with strings?

Turn them into integers

Remove them from portable executables

Make them easier to find

Obfuscate

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?