Login
Remember
Register
Ask a Question
Recent questions in Digital Malware Analysis
0
votes
1
answer
A computer program carrying a malicious segment that joins itself to other executable component or an application program is called ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-segment
0
votes
1
answer
Malicious code activated by a specific event or when a specific condition is met is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-code-activate
malicious-code
0
votes
1
answer
Which of the following is/are steps included in Static Analysis?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
statc-analysis
0
votes
1
answer
Malicious software gathering information about users without their consent/knowledge is called _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-software
+1
vote
1
answer
Which of the following option/options is/are steps included in Dynamic Analysis?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
dynamic-analysis
0
votes
1
answer
Which of the following types of files is supported by IDA pro?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
ida-pro
0
votes
1
answer
Malware that limits access to a computer system by locking the entire system down or encrypting files or until the user executes a requested action is called ________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
spyware
malware
0
votes
1
answer
Which one of these is a Windows Hashing Tool?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
windows-hashing-tool
0
votes
1
answer
Dynamic malware analysis doesn’t need a lab set-up to run malware samples.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
dynamic-malware
malware-sample
0
votes
1
answer
The process by which malware avoids detection by changing the underlying code is known as polymorphism.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
digital-malware
malware
code-snippet
0
votes
1
answer
Adware can trace browsing habits to provide better-targeted ads based on users interests.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
browser-trace
adware
0
votes
1
answer
Wireshark can be used to steal sensitive information over a network.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
wireshark
0
votes
1
answer
Which of the following options are the common phases of malware analysis?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malware-analysis
0
votes
1
answer
Which of the following fields in a PE file specifies the address of the instruction that should be executed first after loading the executable?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
pe-file
0
votes
1
answer
In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
0
votes
1
answer
Which of the following is an example of spyware?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
spyware
0
votes
1
answer
Which of the following tools fully supports the idea of breakpoints?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
breakpoint
0
votes
1
answer
A collection of computers infected with malicious tool/software under control of a hacker is called _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-infected
infection
malicious-tool
0
votes
1
answer
Pick the right hashing algorithm from the following options.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
hashing-algoithm
0
votes
1
answer
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
data-files
0
votes
1
answer
Which one of the following option is a debugging tool?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
debugging-tool
0
votes
1
answer
Time Stamp of a file can be viewed with the help of PEview.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
digital-malware-analysis
file-time-stamp
0
votes
1
answer
Adware tracks browsing habits to provide better-targeted ads based on users interests.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
adware-tracks
0
votes
1
answer
In computer security, the component of the malware, which is responsible for performing malicious action is referred to as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
malware
0
votes
1
answer
Which of the following option is also called a crypto-malware?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
crypto-malware
0
votes
1
answer
_______________ is used by a hacker, in order to mask intrusion and obtain administrator permissions to a computer.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-hack
0
votes
1
answer
Type of malware that performs unwanted and harmful actions in disguise of a legitimate program is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malware-types
0
votes
1
answer
A network of infected systems under the control of a hacker, whose intention is to damage other computer networks by making them unavailable is called __________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
infected-system
hacker-control
0
votes
1
answer
Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
harmful-programs
private-computer
0
votes
1
answer
A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as __________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-segment
Page:
1
2
next »
Recent questions in Digital Malware Analysis
...