Malware Analysis: Static Analysis

Malware Analysis: Static Analysis

University

10 Qs

quiz-placeholder

Similar activities

Unit 3 - 2.4.11 Application Attacks Part 1

Unit 3 - 2.4.11 Application Attacks Part 1

9th Grade - University

5 Qs

Cryptographic Building Blocks Quiz

Cryptographic Building Blocks Quiz

University

10 Qs

Malware Analysis ST-II

Malware Analysis ST-II

University

10 Qs

compiler design quiz

compiler design quiz

University

15 Qs

Shell Scripting

Shell Scripting

University

10 Qs

DFIR Aug 1

DFIR Aug 1

University

10 Qs

Cyberecurity Ess 2

Cyberecurity Ess 2

University

12 Qs

Discrete Math: Long Examination 1 - Statement Analysis

Discrete Math: Long Examination 1 - Statement Analysis

University

10 Qs

Malware Analysis: Static Analysis

Malware Analysis: Static Analysis

Assessment

Quiz

Computers

University

Medium

Created by

James Anderson

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool is NOT used for identifying strings within a malware sample?

Strings

PE Studio

Floss

HashCalc

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hash algorithm is not commonly used to identify malware samples?

MD5

Tiger

SHA256

SHA1

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term "Defanged" means

Analyzing the behavior of malware

Making malware harmless so that it is not accidently detonated

Arming malware so that it can be detonated

The process where Anti-Virus software removes malware from a computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The common password used to protect malware samples when archived

qwerty

password

infected

Pa55w0rD!

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do with your virtual machine before detonating malware?

Reboot

Enable Windows Defender

Create a Snapshot

Suspend

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common website used to identify malware using hash values?

viruslists.com

virustotal.com

virussum.com

virusadditions.com

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware developers use encoding schemes such as base64 to do what with strings?

Turn them into integers

Remove them from portable executables

Make them easier to find

Obfuscate

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?