CHFI Module 11 Malware Forensics

CHFI Module 11 Malware Forensics

University

15 Qs

quiz-placeholder

Similar activities

Ordinario Servicios de Internet

Ordinario Servicios de Internet

University

20 Qs

Chapter 4 ED 606

Chapter 4 ED 606

University

10 Qs

Diseño de Engranes por Medio de Software

Diseño de Engranes por Medio de Software

University

10 Qs

Penilaian Akhir ASJ

Penilaian Akhir ASJ

11th Grade - University

19 Qs

what does this mean

what does this mean

4th Grade - University

10 Qs

Pre Technical Quiz

Pre Technical Quiz

University - Professional Development

11 Qs

IntroAnalisisMalware

IntroAnalisisMalware

University

10 Qs

Pengenalan Microsoft - ARS - Politeknik Nusantara Balikpapan

Pengenalan Microsoft - ARS - Politeknik Nusantara Balikpapan

University

20 Qs

CHFI Module 11 Malware Forensics

CHFI Module 11 Malware Forensics

Assessment

Quiz

Other

University

Medium

Created by

Karen Diggs

Used 83+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware testing should be done on what type of system?

investigators computer

standalone computer

any computer

internet capable computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IDA Pro is a widely used program for malware disassembly

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You can check the startup folders by using the run command shell:startup

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To examine the start-up process, investigators can check the _______ _______ list for viewing services that start automatically when the system boots.

startup services

Windows services

system logs

Registry log

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Components of malware are dependent upon ______________

The person receiving the malware attack

Both the sender and receiver of the malware attack

The person who authored the malware attack

The type of machine being used

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

The command netstat -an displays all active TCP connections as well as the TCP and UDP ports on which the computer is listening along with addresses and port numbers.

True

False

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Process monitor is an important tool for Dynamic Malware Analysis

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?