Search Header Logo

Malware Analysis ST-II

Authored by Joseph Raymond V

Computers

University

Used 1+ times

Malware Analysis ST-II
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..involves monitoring the live traffic to and from the system
during malware execution

Network monitoring

Process monitoring

File system monitoring

Registry monitoring

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is an open source, multipurpose tool that helps in monitoring system resources.

Regshot

Process Hacker

FakeNet

Wireshark

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a Python script that works in conjunction with
Process Monitor and helps in collecting, analyzing, and reporting runtime indicators of the
malware.

Norton

Noriben

Kaspersky

Virus Total

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..is a packet sniffer that allows you to capture the network traffic.

Wireshark

ProcMon

Regshot

CFF Explorer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..is a free Linux-based software suite for simulating standard internet services.

FakeNet

GlomoSIM

HaloSIM

InetSIM

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a tool used for analyzing the behavior of malware by monitoring system calls made by the executable.

Regshot

Sysinternals Suite

Wireshark

ProcMon

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

...is a network analysis tool that provides detailed information about network packets and protocols.

Fiddler

Wireshark

Netcat

Tcpdump

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?