Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
Adware can trace browsing habits to provide better-targeted ads based on users interests.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
browser-trace
adware
0
votes
1
answer
Wireshark can be used to steal sensitive information over a network.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
wireshark
0
votes
1
answer
Which of the following options are the common phases of malware analysis?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malware-analysis
0
votes
1
answer
Which of the following fields in a PE file specifies the address of the instruction that should be executed first after loading the executable?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
pe-file
0
votes
1
answer
In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
0
votes
1
answer
Which of the following is an example of spyware?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
spyware
0
votes
1
answer
Which of the following tools fully supports the idea of breakpoints?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
breakpoint
0
votes
1
answer
A collection of computers infected with malicious tool/software under control of a hacker is called _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-infected
infection
malicious-tool
0
votes
1
answer
Pick the right hashing algorithm from the following options.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
hashing-algoithm
0
votes
1
answer
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
data-files
0
votes
1
answer
Which one of the following option is a debugging tool?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
debugging-tool
0
votes
1
answer
Time Stamp of a file can be viewed with the help of PEview.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
digital-malware-analysis
file-time-stamp
0
votes
1
answer
Adware tracks browsing habits to provide better-targeted ads based on users interests.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
adware-tracks
0
votes
1
answer
We can detect compilers used for building an exe using _________.
asked
Feb 16, 2022
in
Digital for Industries
by
sharadyadav1986
compilers
0
votes
1
answer
In computer security, the component of the malware, which is responsible for performing malicious action is referred to as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
malware
0
votes
1
answer
Which of the following option is also called a crypto-malware?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
crypto-malware
0
votes
1
answer
_______________ is used by a hacker, in order to mask intrusion and obtain administrator permissions to a computer.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-hack
0
votes
1
answer
Type of malware that performs unwanted and harmful actions in disguise of a legitimate program is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malware-types
0
votes
1
answer
A network of infected systems under the control of a hacker, whose intention is to damage other computer networks by making them unavailable is called __________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
infected-system
hacker-control
0
votes
1
answer
Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
harmful-programs
private-computer
0
votes
1
answer
A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as __________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-segment
0
votes
1
answer
A type of Trojan installed through an exploit or an email attachment onto a PC is known as _____________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
trojan
email-attachment
0
votes
1
answer
Who among the following is considered to be an advanced SME w.r.t Apache Metron Platform _____________.
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
apache-metron-platform
0
votes
1
answer
Metron apart from in-built Geo Enrichment supports.
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
metron-support
apache-metron
0
votes
1
answer
Pick out the Stellar Keyword among the following.
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
stellar-keyword
apache-metron
0
votes
1
answer
DPI(Deep Packet Inspection) Data is best to be extracted only for ____________.
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
dpi
deep-packet-inspection
apache-metron
0
votes
1
answer
How does Network Intrusion Detection System works?
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
network-detection
apache-metron
0
votes
1
answer
Default Indexer of Metron is ____________.
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
indexer-metron
apache-metron
0
votes
1
answer
Stellar is Integrated into Metron Components such as _________.
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
stellar-metron
metron-component
0
votes
1
answer
Zeppelin Interpreter do NOT support.
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
zeppelin-interpreter
apache-metron
Page:
« prev
1
...
563
564
565
566
567
568
569
570
571
572
573
...
667
...
next »
Recent questions
...