9.1.12 - Malware (Practice Questions)
JPS
Patrick is planning a penetration test for a client. As a part of this test, he will perform a phishing attack. He needs to create a virus to distribute through email and run a custom script that will let him track who has run the virus. Which of the following programs will allow him to create this virus?
Dropper
Which of the following parts of the trojan horse packet installs the malicious code onto the target machine?
Launch
A virus has replicated itself throughout the infected systems and is executing its payload. Which of the following phases of the virus life cycle is the virus in?
Sheep dipping
Analyzing emails, suspect files, and systems for malware is known as which of the following?
Host integrity monitoring
Ruudy is analyzing a piece of malware discovered in a pentest. He has taken a snapshot of the test system and will run the malware. He will take a snapshot afterwards and monitor different components such as ports, processes, event logs, and more for any changes. Which of the following processes is he using?
Scareware
Which of the following malware types shows the user signs of potential harm that could occur if the user doesnt take a certain action?
Logic bomb
Which of the following virus types is shown in the code below?
Trojan Horse
Heather wants to gain remote access to Randy's machine. She has developed a program and hidden it inside a legitimate program that she is sure Randy will install on his machine. Which of the following types of malware is she using?
Worm
Heather is performing a penetration test of her client's malware protection. She has developed a malware program that doesn't require any user interaction and wants to see how far it will spread through the network. Which of the following types of malware is she using?
A crypter can encrypt, obfuscate, and manipulate malware to make it difficult to detect.
The program shown is a crypter. Which of the following best defines what this program does?
A collection of software that detects and analyzes malware.
Which of the following best describes an anti-virus sensor system?
CAN-SPAM Act
Which of the following laws is designed to regulate emails?