Web Technologies
Android
Angular
BootStrap
ECMAScript
HTML
Image Processing
JavaScript
MVC
Onsen UI
React JS
SOAP UI
Vue.js
Cloud/DevOps Technologies
Amazon EC2
Ansible
Augmented Reality
AWS
Azure
Big Data
Cache Teachniques
Cassandra
Commercial Insurance
Cloud
CD
CI
Data Handling
Data using R
Data Science
DevOps
Gradle
Hadoop
HBase
HDFS
Hive
IOT
Jenkins
Machine Learning
MangoDB
NGINX
SOAP UI
Latest Technologies
5G Network
Agile
Android
Arduino
Augmented Reality
Commercial Insurance
C#
C++
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Image Processing
Java
Jenkins
Jira
JUnit
Kibana
Linux
MangoDB
Oracle
PHP
Python
QTP
R Language
Regression Analysis
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions and answers in Digital Malware Analysis
Home
Questions
Digital Malware Analysis
0
votes
A computer program carrying a malicious segment that joins itself to other executable component or an application program is called ___________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
malicious-segment
0
votes
Malicious code activated by a specific event or when a specific condition is met is known as _________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
malicious-code-activate
malicious-code
0
votes
Which of the following is/are steps included in Static Analysis?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
statc-analysis
0
votes
Malicious software gathering information about users without their consent/knowledge is called _________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
malicious-software
+1
vote
Which of the following option/options is/are steps included in Dynamic Analysis?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
dynamic-analysis
0
votes
Which of the following types of files is supported by IDA pro?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
ida-pro
0
votes
Malware that limits access to a computer system by locking the entire system down or encrypting files or until the user executes a requested action is called ________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
spyware
malware
0
votes
Which one of these is a Windows Hashing Tool?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
windows-hashing-tool
0
votes
Dynamic malware analysis doesn’t need a lab set-up to run malware samples.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
dynamic-malware
malware-sample
0
votes
The process by which malware avoids detection by changing the underlying code is known as polymorphism.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
digital-malware
malware
code-snippet
0
votes
Adware can trace browsing habits to provide better-targeted ads based on users interests.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
browser-trace
adware
0
votes
Wireshark can be used to steal sensitive information over a network.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
wireshark
0
votes
Which of the following options are the common phases of malware analysis?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
malware-analysis
0
votes
Which of the following fields in a PE file specifies the address of the instruction that should be executed first after loading the executable?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
pe-file
0
votes
In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
computer-security
0
votes
Which of the following is an example of spyware?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
spyware
0
votes
Which of the following tools fully supports the idea of breakpoints?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
breakpoint
0
votes
A collection of computers infected with malicious tool/software under control of a hacker is called _________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
computer-infected
infection
malicious-tool
0
votes
Pick the right hashing algorithm from the following options.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
hashing-algoithm
0
votes
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
data-files
0
votes
Which one of the following option is a debugging tool?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
debugging-tool
0
votes
Time Stamp of a file can be viewed with the help of PEview.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
digital-malware-analysis
file-time-stamp
0
votes
Adware tracks browsing habits to provide better-targeted ads based on users interests.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
adware-tracks
0
votes
In computer security, the component of the malware, which is responsible for performing malicious action is referred to as ___________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
computer-security
malware
0
votes
Which of the following option is also called a crypto-malware?
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
crypto-malware
0
votes
_______________ is used by a hacker, in order to mask intrusion and obtain administrator permissions to a computer.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
computer-hack
0
votes
Type of malware that performs unwanted and harmful actions in disguise of a legitimate program is known as _________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
malware-types
0
votes
A network of infected systems under the control of a hacker, whose intention is to damage other computer networks by making them unavailable is called __________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
infected-system
hacker-control
0
votes
Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
harmful-programs
private-computer
0
votes
A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as __________.
answered
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
(
30.6k
points)
malicious-segment
To see more, click for all the
questions in this category
.
...