Top 30 Digital Malware Analysis Interview Questions and Answers

Demonstrate the technical knowledge required to conduct basic Digital Malware Analysis Investigations.

 

Digital Malware Analysis

Question:1 A type of Trojan installed through an exploit or an email attachment onto a PC is known as _____________.
Find the correct answer :-wer:
A. Dialer

B. Spyware

C. Downloader

D. Proxy

answer :- : Downloader

Question:2 A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as __________.
Find the correct answer :-wer:
A. Virus

B. Adware

C. Spam

D. Flash cookie

answer :- : Virus

Question:3 Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
Find the correct answer :-wer:
A. Rootkit

B. Adware

C. Viruses

D. All the options

answer :- : All the options

Question:4 A network of infected systems under the control of a hacker, whose intention is to damage other computer networks by making them unavailable is called __________.
Find the correct answer :-wer:
A. Flash cookie

B. Botnet

C. Trojan

D. DDoS attack

answer :- : Trojan

Question:5 Type of malware that performs unwanted and harmful actions in disguise of a legitimate program is known as _________.
Find the correct answer :-wer:
A. Trojan

B. Backdoor

C. Adware

D. Spyware

answer :- : Trojan

Question:6 _______________ is used by a hacker, in order to mask intrusion and obtain administrator permissions to a computer.
Find the correct answer :-wer:
A. Armored virus

B. Spyware

C. Trojan

D. Rootkit

answer :- : Rootkit

Question:7 Which of the following option is also called a crypto-malware?
Find the correct answer :-wer:
A. Ranswer :-omware

B. Rootkit

C. Keylogger

D. Backdoor

answer :- : Ranswer :-omware

Question:8 In computer security, the component of the malware, which is responsible for performing malicious action is referred to as ___________.
Find the correct answer :-wer:
A. Exploit

B. Frame

C. Logic bomb

D. Payload

answer :- : Payload

Question:9 We can detect compilers used for building an exe using _________.
Find the correct answer :-wer:
A. PEView

B. PEiD

C. UPX

D. All the options

answer :- : PEiD

Question:10 Adware tracks browsing habits to provide better-targeted ads based on users interests.
Find the correct answer :-wer:
A. True

B. False

answer :- : True

Question:11 Time Stamp of a file can be viewed with the help of PEview.
Find the correct answer :-wer:
A. True

B. False

answer :- : True

Question:12 Which one of the following option is a debugging tool?
Find the correct answer :-wer:
A. VirusTotal

B. Wireshark

C. ProcessHacker

D. WinDbg

answer :- : WinDbg

Question:13 Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
Find the correct answer :-wer:
A. Signature files

B. Security logs

C. Repositories

D. Macros

answer :- : Signature files

Question:14 Pick the right hashing algorithm from the following options.
Find the correct answer :-wer:
A. MD5

B. AES

C. Sh22e

D. RC4

answer :- : MD5

Question:15 A collection of computers infected with malicious tool/software under control of a hacker is called _________.
Find the correct answer :-wer:
A. Honeypot

B. Botnet

C. Honeynet

D. Ethernet

answer :- : Botnet

Question:16 Which of the following tools fully supports the idea of breakpoints?
Find the correct answer :-wer:
A. Disassembler

B. Sniffer

C. Logger

D. Debugger

answer :- : Debugger

Question:17 Which of the following is an example of spyware?
Find the correct answer :-wer:
A. Protocol analyzer

B. Vulnerability scanner

C. Packet sniffer

D. Keylogger

answer :- : Keylogger

Question:18 In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
Find the correct answer :-wer:
A. Payload

B. Logic bomb

C. Frame

D. Exploit

answer :- : Payload

Question:19 Which of the following fields in a PE file specifies the address of the instruction that should be executed first after loading the executable?
Find the correct answer :-wer:
A. First Bytes

B. File offset

C. EP section

D. Entry Point

answer :- : Entry Point

Question:20 Which of the following options are the common phases of malware analysis?
Find the correct answer :-wer:
A. User and Kernel mode analysis

B. Identification and containment

C. Static and Dynamic analysis

D. Registry and file system analysis

answer :- : Static and Dynamic analysis

Question:21 Wireshark can be used to steal sensitive information over a network.
Find the correct answer :-wer:
A. True

B. False

answer :- : True

Question:22 Adware can trace browsing habits to provide better-targeted ads based on users interests.
Find the correct answer :-wer:
A. True

B. False

answer :- : True

Question:23 The process by which malware avoids detection by changing the underlying code is known as polymorphism.
Find the correct answer :-wer:
A. True

B. False

answer :- : True

Question:24 Dynamic malware analysis doesn’t need a lab set-up to run malware samples.
Find the correct answer :-wer:
A. True

B. False

answer :- : True

Question:25 Which one of these is a Windows Hashing Tool?
Find the correct answer :-wer:
A. sha256sum

B. sha1sum

C. md5sum

D. md5deep

answer :- : sha256sum

Question:26 Malware that limits access to a computer system by locking the entire system down or encrypting files or until the user executes a requested action is called ________.
Find the correct answer :-wer:
A. Adware

B. Grayware

C. Spyware

D. Ranswer :-omware

answer :- : Ranswer :-omware

Question:27 Which of the following types of files is supported by IDA pro?
Find the correct answer :-wer:
A. .txt

B. .pdf

C. .exe

D. .png

answer :- : .png

Question:28 Which of the following option/options is/are steps included in Dynamic Analysis?
Find the correct answer :-wer:
A. Registry Analysis

B. Network Analysis

C. File System Modification

D. All the options

answer :- : All the options

Question:29 Malicious software gathering information about users without their consent/knowledge is called _________.
Find the correct answer :-wer:
A. Spyware

B. Adware

C. Backdoor

D. Virus

answer :- : Spyware

Question:30 Which of the following is/are steps included in Static Analysis?
Find the correct answer :-wer:
A. Extracting readable strings

B. File fingerprinting

C. Both

D. None of the options

answer :- : Both

Question:31 Malicious code activated by a specific event or when a specific condition is met is known as _________.
Find the correct answer :-wer:
A. Logic bomb

B. Trojan

C. Armored virus

D. Spyware

answer :- : Logic bomb

Question:32 A computer program carrying a malicious segment that joins itself to other executable component or an application program is called ___________.
Find the correct answer :-wer:
A. Flash cookie

B. Virus

C. Adware

D. Spam

answer :- : Virus

Question:33 The process by which malware avoids detection by changing the underlying code is known as polymorphism.
Find the correct answer :-wer:
A. True

B. False

answer :- : True

Question:34 Adware can trace browsing habits to provide better-targeted ads based on users interests.
Find the correct answer :-wer:
A. True

B. False

answer :- : True

Question:35 Harmful programs utilized to interrupt computer operation, gain sensitive information, or obtain access to private computer systems are known as __________.
Find the correct answer :-wer:
A. Viruses

B. Rootkit

C. Adware

D. All the options

answer :- : All the options

 

About Author


After years of Technical Work, I feel like an expert when it comes to Develop wordpress website. Check out How to Create a Wordpress Website in 5 Mins, and Earn Money Online Follow me on Facebook for all the latest updates.