• Tutorials
  • Courses
  • Tracks

Cyber Quiz Day 46

Last Updated :
Discuss
Comments

Question 1

Which of the following best describes the main goal of static malware analysis?

  • To execute malware in a sandbox and record system changes.

  • To analyze the malware’s code or binary without running it.

  • To monitor live network traffic from an infected machine.

  • To compare logs generated during runtime execution.

Question 2

During static analysis, why is it important to inspect the PE (Portable Executable) header of a Windows file?

  • It reveals the file’s compression algorithm.

  • It provides information about compilation date, import/export tables, and architecture.

  • It identifies network connections the malware will use.

  • It decrypts the payload directly from memory.

Question 3

What is a strong indicator that a Windows binary might be packed or obfuscated when viewed in PEStudio?

  • The file has many readable ASCII strings.

  • Import Table shows only a few generic APIs like LoadLibrary and GetProcAddress.

  • The file has a digital signature from Microsoft.

  • The PE header checksum matches exactly.

Question 4

Which of the following hashing algorithms is most commonly used today for file integrity verification in malware analysis?

  • MD5

  • SHA-1

  • SHA-56

  • DES

Question 5

When comparing two malware samples, which observation indicates they are different variants of the same malware family rather than identical files?

  • Identical MD5 and SHA-256 hashes

  • Same file size and timestamp

  • Different PE file types (one EXE, one DLL)

  • Same section names, APIs, and strings but different hashes

Question 6

In static malware analysis, how does RegShot help an analyst detect malicious activity after executing a suspicious file?

  • It provides real-time network packet captures to detect command-and-control communication

  • It compares system memory dumps before and after malware execution

  • It generates YARA rules automatically from executable code patterns

  • It takes registry and file system snapshots before and after execution to identify changes

Question 7

Why is relying only on MD5 hashes for malware detection considered unsafe?

  • MD5 cannot generate a hash for files larger than 4 GB.

  • MD5 hashes can produce collisions — different files with the same hash.

  • MD5 changes every time the file is opened.

  • MD5 is not supported by most malware databases.

Question 8

In static analysis, extracting readable strings (using the strings command) helps analysts to:

  • Execute the malware safely.

  • Disassemble the binary into assembly code.

  • Bypass encryption used by the malware.

  • Identify suspicious URLs, registry keys, or commands embedded in the binary.

Question 9

What does a digital signature mismatch in PEStudio typically indicate during malware inspection?

  • The malware has expired.

  • The file has been altered or tampered with after signing.

  • The signature was made with an old hashing algorithm.

  • The system clock is incorrect.

Question 10

Why is verifying a file’s hash value (like MD5 or SHA256) essential before and after malware analysis?

  • To check if the file size has changed

  • To remove malicious code automatically

  • To compress the file for easier transfer

  • To ensure file integrity and confirm no tampering occurred

There are 10 questions to complete.

Take a part in the ongoing discussion