Malware Concepts:
Is a malicious software that damages or disables computer systems and gives limited or full control of the systems to the malware creator for the purpose of theft or fraud.
a. Spyware
b. Underwear
c. Adware
d. Malware
d. Malware
Malware Concepts:
A malicious code that breaches the system security via software vulnerabilities to access information or install malware.
a. Crypter
b. Downloader
c. Dropper
d. Exploit
e. Wrapper
f. Obfuscator
d. Exploit
Trojan Concepts:
e. Wrapper
Trojan Concepts:
b. Remote Access Trojans
Trojan Concepts:
d. Covert Channel Trojans
Virus and Worm Concepts:
Infect the system boot sector and the executable files at the same time.
a. Macro Viruses
b. Multipartite Viruses
c. Cluster Viruses
d. Stealth Viruses/Tunneling Viruses
b. Multipartite Viruses
Virus and Worm Concepts:
a. Macro Viruses
Virus and Worm Concepts:
d. Stealth Viruses/Tunneling Viruses
Virus and Worm Concepts:
a. Polymorphic Viruses
Comments:
The hint here to solve the questions is: keeping the original algorithm.
Polymorphic virus -> encrypt itself with a variable encryption key so that each copy of the virus looks different (because it’s encrypted with a different key). not all of the virus is encrypted, mind you, because the virus needs to decrypt itself in order to operate. as such there is a decryption stub that remains unencrypted and in the simplest polymorphic viruses this stub also remains constant (that part of it always looks the same) so it can be used to detect the presence of the virus. further, because the virus has to decrypt itself in order to operate, and because the unencrypted form of the virus doesn’t change, AV products are often able to recognize the virus by emulating its execution for long enough that it will decrypt itself and then examining the result.
Metamorphic virus is one that can translate and rewrite it’s own code so that, once again, each copy of the virus looks different. unlike polymorphic viruses, metamorphic viruses don’t really require a decryption stub because they aren’t encrypted. when the virus creates a new copy of itself it translates it’s existing instructions into functionally equivalent instructions in a new code.. As a result, no part of the virus remains constant and the virus is never returned to it’s original form during execution, which makes it more difficult for AV products to recognize.
Virus and Worm Concepts:
d. Companion/Camouflage Viruses
Virus and Worm Concepts:
Is a virus that is triggered by a response to an event.
a. Polymorphic Viruses
b. Metaporphic Viruses
c. Logic Bomb Viruses
d. Companion/Camouflage Viruses
c. Logic Bomb Viruses
Virus and Worm Concepts:
Worms
Malware Analysis:
Is a windows built-in utility used for checking integrity of the files and track changes to the files.
a. Tripwire File Integrity Manager
b. Verisys
c. Netwrix Auditor
d. SIGVERIF
d. SIGVERIF
Malware Analysis:
a. APIs (Application Programming Interfaces)
Malware Penetration Testing:
Check the data files for modification or manipulation by opening several files and comparing the hash value of these files with a pre-computed hasing using tools like: (Choose 2)
a. SIGVERIF
b. Solarwinds
c. SysAnalyzer
d. Tripwire
a. SIGVERIF
d. Tripwire