Malware Concepts:
Is a malicious software that damages or disables computer systems and gives limited or full control of the systems to the malware creator for the purpose of theft or fraud.
a. Spyware
b. Underwear
c. Adware
d. Malware
d. Malware
Malware Concepts:
A malicious code that breaches the system security via software vulnerabilities to access information or install malware.
a. Crypter
b. Downloader
c. Dropper
d. Exploit
e. Wrapper
f. Obfuscator
d. Exploit
Trojan Concepts:
e. Wrapper
Trojan Concepts:
b. Remote Access Trojans
Trojan Concepts:
d. Covert Channel Trojans
Virus and Worm Concepts:
Infect the system boot sector and the executable files at the same time.
a. Macro Viruses
b. Multipartite Viruses
c. Cluster Viruses
d. Stealth Viruses/Tunneling Viruses
b. Multipartite Viruses
Virus and Worm Concepts:
a. Macro Viruses
Virus and Worm Concepts:
d. Stealth Viruses/Tunneling Viruses
Virus and Worm Concepts:
a. Polymorphic Viruses
Virus and Worm Concepts:
d. Companion/Camouflage Viruses
Virus and Worm Concepts:
Is a virus that is triggered by a response to an event.
a. Polymorphic Viruses
b. Metaporphic Viruses
c. Logic Bomb Viruses
d. Companion/Camouflage Viruses
c. Logic Bomb Viruses
Virus and Worm Concepts:
Worms
Malware Analysis:
Is a windows built-in utility used for checking integrity of the files and track changes to the files.
a. Tripwire File Integrity Manager
b. Verisys
c. Netwrix Auditor
d. SIGVERIF
d. SIGVERIF
Malware Analysis:
a. APIs (Application Programming Interfaces)
Malware Penetration Testing:
Check the data files for modification or manipulation by opening several files and comparing the hash value of these files with a pre-computed hasing using tools like: (Choose 2)
a. SIGVERIF
b. Solarwinds
c. SysAnalyzer
d. Tripwire
a. SIGVERIF
d. Tripwire