Malware Analysis ST-II

Malware Analysis ST-II

University

10 Qs

quiz-placeholder

Similar activities

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

Taller hacking ético

Taller hacking ético

9th Grade - Professional Development

10 Qs

Cyber Security Quiz: Protect and Analyse

Cyber Security Quiz: Protect and Analyse

University

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Fellowship program 2021

Fellowship program 2021

University - Professional Development

15 Qs

Building a Small Network

Building a Small Network

University

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

Malware Analysis ST-II

Malware Analysis ST-II

Assessment

Quiz

Computers

University

Medium

Created by

Joseph Raymond V

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..involves monitoring the live traffic to and from the system
during malware execution

Network monitoring

Process monitoring

File system monitoring

Registry monitoring

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is an open source, multipurpose tool that helps in monitoring system resources.

Regshot

Process Hacker

FakeNet

Wireshark

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a Python script that works in conjunction with
Process Monitor and helps in collecting, analyzing, and reporting runtime indicators of the
malware.

Norton

Noriben

Kaspersky

Virus Total

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..is a packet sniffer that allows you to capture the network traffic.

Wireshark

ProcMon

Regshot

CFF Explorer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..is a free Linux-based software suite for simulating standard internet services.

FakeNet

GlomoSIM

HaloSIM

InetSIM

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a tool used for analyzing the behavior of malware by monitoring system calls made by the executable.

Regshot

Sysinternals Suite

Wireshark

ProcMon

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a network analysis tool that provides detailed information about network packets and protocols.

Fiddler

Wireshark

Netcat

Tcpdump

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers