Week 8 Q's Flashcards
What is the difference between a virus and a worm?
A. A virus spreads through networks, while a worm spreads through physical media
B. A virus modifies existing code, while a worm creates its own code
C. A virus is a standalone executable, while a worm is a script
D. A virus hides in plain sight, while a worm is hard to detect
B
What is the purpose of a packer in malware?
A. To compress the code to make it smaller
B. To obfuscate the code to make it harder to analyze
C. To encrypt the code to prevent detection
D. To create a backup of the code in case it is lost
B
What is steganography in the context of malware?
A. The use of encryption to hide malware code
B. The use of social engineering to trick users into downloading malware
C. The use of a rootkit to hide malware on a system
D. The use of images or other files to hide malware code
D
What is a rootkit?
A. A tool used by malware authors to gain root access to a system
B. A type of malware that is difficult to detect and remove
C. A collection of tools used by malware analysts to analyze malware
D. A tool used by system administrators to manage root-level permissions
B
What is the purpose of a sandbox in malware analysis?
A. To run malware in a controlled environment to observe its behavior
B. To isolate infected systems from the network
C. To prevent malware from spreading to other systems
D. To test the effectiveness of antivirus software
A
What is the difference between static and dynamic analysis of malware?
A. Static analysis examines the behavior of malware, while dynamic analysis examines its code
B. Static analysis examines the code of malware, while dynamic analysis examines its behavior
C. Static analysis involves running malware in a virtual environment, while dynamic analysis involves
examining the system calls made by malware
D. Static analysis involves examining the network traffic generated by malware, while dynamic
analysis involves examining its registry entries
B
What is code obfuscation in malware?
A. The process of encrypting malware code
B. The process of hiding malware code from antivirus software
C. The process of making malware code difficult to read and understand
D. The process of compressing malware code to make it smaller
C
What is a packer detection tool?
A. A tool used to detect the presence of malware on a system
B. A tool used to detect the presence of a packer on a binary file
C. A tool used to detect the presence of a rootkit on a system
D. A tool used to detect the presence of a sandbox on a system
B
What is an anti-debugging technique in malware?
A. A technique used to detect the presence of a debugger on a system
B. A technique used to prevent malware from being analyzed in a debugger
C. A technique used to encrypt the malware code to prevent debugging
D. A technique used to crash the debugger when it is used to analyze malware
B
What is a hooking technique in malware?
A. A technique used to modify system calls to redirect them to malicious code
B. A technique used to detect the presence of a debugger on a system
C. A technique used to hide the presence of malware on a system
D. A technique used to encrypt the malware code to prevent detection
A
What is a rootkit hook?
A. A technique used by rootkits to intercept system calls and modify their behavior
B. A technique used by rootkits to encrypt their code to prevent detection
C. A technique used by rootkits to hide their presence on a system
D. A technique used by rootkits to spread to other systems on a network
A
What is the difference between a keylogger and a backdoor?
A. A keylogger records keystrokes, while a backdoor provides access to a system
B. A keylogger provides access to a system, while a backdoor records keystrokes
C. A keylogger and a backdoor are the same thing
D. A keylogger and a backdoor are both types of worms
A
What is a code injection attack?
A. A technique used by malware to inject code into a running process
B. A technique used by malware to inject code into a website
C. A technique used by malware to inject code into a network packet
D. A technique used by malware to inject code into a file on disk
A
What is a heap spray attack?
A. A technique used by malware to fill the heap memory with shellcode
B. A technique used by malware to fill the stack memory with shellcode
C. A technique used by malware to fill the CPU cache with shellcode
D. A technique used by malware to fill the disk cache with shellcode
A
What is a return-oriented programming (ROP) attack?
A. A technique used by malware to bypass security mechanisms by reusing small pieces of code from legitimate software
B. A technique used by malware to execute arbitrary code on a system
C. A technique used by malware to modify the stack pointer to redirect program flow
D. A technique used by malware to inject code into a running process
A