What's Your Malware Analysis Process? Quiz

10 Questions | Total Attempts: 9152

SettingsSettingsSettings
What

Here is a quick and interesting 'What's your malware analysis process' quiz that is designed to assess your malware analysis skills and help you learn something new in the process. Do you know everything about malware analysis? There are chances that your malware and reverse-engineering skills might need a tune-up. Take this quiz and see how well you can score on this test. Don't worry, this quiz consists of easy questions that'll keep you engaged and help you revise your skills as well. So, get ready to test your brain skills. All the best!


Questions and Answers
  • 1. 
    Which of the following tools best supports the concept of breakpoints?
    • A. 

      Debugger

    • B. 

      Disassembler

    • C. 

      Sniffer

    • D. 

      Logger

  • 2. 
    Which x86 register is most commonly used for storing a function's return value in assembler?
    • A. 

      ECX

    • B. 

      EIP

    • C. 

      EAX

    • D. 

      EFLAGS

  • 3. 
    In the context of malware analysis, what does the term "patching" refer to?
    • A. 

      Installing software updates that address vulnerabilities in installed software.

    • B. 

      Setting memory breakpoints by modifying access flags on memory segments.

    • C. 

      Stepping through the executable without running every instruction within function calls.

    • D. 

      Modifying a compiled executable to change its functionality without having to recompile it.

  • 4. 
    Which of the following assembly instructions is least likely to be used by malicious code to perform a jump?
    • A. 

      JMP

    • B. 

      XOR

    • C. 

      RET

    • D. 

      CALL

  • 5. 
    Which mechanism is malware least likely to use when defending itself against analysis?
    • A. 

      Inserting junk code instructions

    • B. 

      Employing polarization techniques

    • C. 

      Making use of "tricky" jump instructions

    • D. 

      Detecting the presence of a debugger

  • 6. 
    Which of the following defensive measures do malware authors use to encode the original executable to protect it against static code analysis?
    • A. 

      Employing fast-flux DNS techniques

    • B. 

      Embedding an imports table in the malicious executable

    • C. 

      Targeting client-side vulnerabilities

    • D. 

      Packing the malicious executable

  • 7. 
    Which of the following terms refers to a field in the PE header that specifies the address of the instruction that the OS should execute first after loading the executable?
    • A. 

      Starting Point

    • B. 

      Point of Origin

    • C. 

      Entry Point

    • D. 

      Thread Origination Point

  • 8. 
    Which of the following system calls is most likely to be used by a keylogger?
    • A. 

      GetProcAddress

    • B. 

      VirtualAllocEx

    • C. 

      POP

    • D. 

      GetAsyncKeyState

  • 9. 
    Which of the following Windows registry keys is most useful for malware that aims at maintaining persistent presence on the infected system?
    • A. 

      HKLM\Software\Microsoft\Windows\CurrentVersion\Run

    • B. 

      HKLM\SECURITY

    • C. 

      %UserProfile%\ntuser.dat

    • D. 

      HKCU\System\CurrentControlSet\Control\MediaProperties

  • 10. 
    What are the two most common phases of malware analysis? 
    • A. 

      Behavioral and code analysis

    • B. 

      Identification and containment analysis

    • C. 

      Registry and file system analysis

    • D. 

      User and kernel mode analysis

Back to Top Back to top