9.1.12 - Malware (Practice Questions)

¡Supera tus tareas y exámenes ahora con Quizwiz!

JPS

Patrick is planning a penetration test for a client. As a part of this test, he will perform a phishing attack. He needs to create a virus to distribute through email and run a custom script that will let him track who has run the virus. Which of the following programs will allow him to create this virus?

Dropper

Which of the following parts of the trojan horse packet installs the malicious code onto the target machine?

Launch

A virus has replicated itself throughout the infected systems and is executing its payload. Which of the following phases of the virus life cycle is the virus in?

Sheep dipping

Analyzing emails, suspect files, and systems for malware is known as which of the following?

Host integrity monitoring

Ruudy is analyzing a piece of malware discovered in a pentest. He has taken a snapshot of the test system and will run the malware. He will take a snapshot afterwards and monitor different components such as ports, processes, event logs, and more for any changes. Which of the following processes is he using?

Scareware

Which of the following malware types shows the user signs of potential harm that could occur if the user doesnt take a certain action?

Logic bomb

Which of the following virus types is shown in the code below?

Trojan Horse

Heather wants to gain remote access to Randy's machine. She has developed a program and hidden it inside a legitimate program that she is sure Randy will install on his machine. Which of the following types of malware is she using?

Worm

Heather is performing a penetration test of her client's malware protection. She has developed a malware program that doesn't require any user interaction and wants to see how far it will spread through the network. Which of the following types of malware is she using?

A crypter can encrypt, obfuscate, and manipulate malware to make it difficult to detect.

The program shown is a crypter. Which of the following best defines what this program does?

A collection of software that detects and analyzes malware.

Which of the following best describes an anti-virus sensor system?

CAN-SPAM Act

Which of the following laws is designed to regulate emails?


Conjuntos de estudio relacionados

Ch 46 Assessment and Management of Patients with Diabetes

View Set

13. Alabama insurance law pertinent to Life insurance

View Set

Chapter 14 Account Payable and other Liabilities

View Set

Ch 3 - Assessment and Health Promotion

View Set

Information Security General Concepts

View Set