14 Flashcards

1
Q

What is the main difference between static and dynamic analysis?

A

Static analysis examines code without executing it, while dynamic analysis involves running the code to observe its behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Static analysis is generally faster than dynamic analysis.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of analysis is more effective at detecting fileless malware?

A

Dynamic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is fileless malware?

A

Fileless malware operates in memory without leaving a footprint on the system’s disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank: Fileless malware does not rely on __________ to carry out malicious activities.

A

files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a common delivery method for fileless malware?

A

Malicious scripts or macros in documents or emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the advantage of static analysis over dynamic analysis?

A

Static analysis can detect vulnerabilities early in the development process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the advantage of dynamic analysis over static analysis?

A

Dynamic analysis can uncover behavior that may not be apparent from static analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some challenges of detecting fileless malware?

A

Fileless malware can evade traditional antivirus software and leave little to no trace on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of a fileless malware attack technique?

A

PowerShell-based attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of analysis is better suited for detecting PowerShell-based fileless malware attacks?

A

Dynamic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary goal of fileless malware attackers?

A

To remain undetected and carry out malicious activities without leaving traditional traces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some mitigation strategies against fileless malware attacks?

A

Implementing application whitelisting, monitoring system behavior, and restricting administrative privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of endpoint detection and response (EDR) solutions in combating fileless malware?

A

EDR solutions can detect and respond to fileless malware threats in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the importance of continuous monitoring in detecting fileless malware?

A

Continuous monitoring can help identify unusual behavior indicative of fileless malware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: Fileless malware attacks are easy to detect and mitigate.

A

False

17
Q

What is the significance of behavioral analysis in detecting fileless malware?

A

Behavioral analysis can identify suspicious activities that may indicate the presence of fileless malware.

18
Q

What is an example of a tool used for dynamic analysis of malware?

A

Sandbox environments

19
Q

What is the key takeaway regarding the importance of both static and dynamic analysis in combating fileless malware?

A

A combination of both static and dynamic analysis is essential for comprehensive malware detection and prevention.