9.1.12 Practice Questions Flashcards

1
Q

An illustration of the SWAYZ CRYPTOR program.
The program shown is a crypter. Which of the following best defines what this program does?

answer

A crypter compresses the malware to reduce its size and help hide it from anti-malware software.

A crypter takes advantage of a bug or vulnerability to execute the malware’s payload.

A crypter can encrypt, obfuscate, and manipulate malware to make it difficult to detect.

A crypter is the main piece of the malware, the part of the program that performs the malware’s intended activity.

A

A crypter can encrypt, obfuscate, and manipulate malware to make it difficult to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Listen to exam instructions
Which of the following laws is designed to regulate emails?

answer

CAN-SPAM Act

HIPAA

USA Patriot Act

CFAA

A

CAN-SPAM Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An illustration of a block of code.
Which of the following virus types is shown in the code below?

answer

Metamorphic

Direct action

Cavity

Logic bomb

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Listen to exam instructions
A virus has replicated itself throughout the infected systems and is executing its payload. Which of the following phases of the virus lifecycle is the virus in?

answer

Launch

Replication

Design

Incorporation

A

Launch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Heather is performing a penetration test of her client’s malware protection. She has developed a malware program that doesn’t require any user interaction and wants to see how far it will spread through the network. Which of the following types of malware is she using?

answer

Virus

Worm

Spyware

Trojan horse

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following parts of the Trojan horse packet installs the malicious code onto the target machine?

answer

Server

Dropper

Construction kit

Wrapper

A

Dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Heather wants to gain remote access to Randy’s machine. She has developed a program and hidden it inside a legitimate program that she is sure Randy will install on his machine. Which of the following types of malware is she using?

answer

Worm

Spyware

Trojan horse

Virus

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Listen to exam instructions
Which of the following malware types shows the user signs of potential harm that could occur if the user doesn’t take a certain action?

answer

Spyware

Scareware

Adware

Ransomware

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Listen to exam instructions
Patrick is planning a penetration test for a client. As part of this test, he will perform a phishing attack. He needs to create a virus to distribute through email and run a custom script that will let him track who has run the virus. Which of the following programs will allow him to create this virus?

answer

Webroot

JPS

ProRat

TCPView

A

JPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rudy is analyzing a piece of malware discovered in a pentest. He has taken a snapshot of the test system and will run the malware. He will take a snapshot afterwards and monitor different components such as ports, processes, event logs, and more for any changes. Which of the following processes is he using?

answer

Malware disassembly

Host integrity monitoring

Static analysis

Sheep dipping

A

Host integrity monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Listen to exam instructions
Analyzing emails, suspect files, and systems for malware is known as which of the following?

answer

Integrity checking

Sheep dipping

Dynamic analysis

Static analysis

A

Sheep dipping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best describes an anti-virus sensor system?

answer

Software that is used to protect a system from malware infections.

Analyzing the code of malware to understand its purpose without running it.

Analyzing malware by running and observing its behavior and effects.

A collection of software that detects and analyzes malware.

A

A collection of software that detects and analyzes malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly