• Tutorials
  • Courses
  • Tracks

Cyber Quiz Day 48

Last Updated :
Discuss
Comments

Question 1

What is the main goal of dynamic malware analysis?

  • To understand malware logic by decompiling it

  • To identify file hashes before execution

  • To extract readable strings from the binary

  • To observe malware behavior during execution in a controlled environment

Question 2

Which tool provides real-time monitoring of system and registry events when executing a malware sample?

  • Process Monitor

  • PEview

  • Resource Hacker

  • Strings

Question 3

You execute a malware sample in a sandbox and see multiple processes like svchost.exe and cmd.exe. Which tool helps visualize parent-child process relationships?

  • Process Explorer

  • Process Hacker

  • RegShot

  • Autoruns

Question 4

If malware modifies registry entries to start automatically after reboot, which tool can confirm this by comparing snapshots?

  • RegShot

  • Process Monitor

  • PE Studio

  • BinText

Question 5

While analyzing with Process Monitor, you observe frequent WriteFile operations to .tmp files in %AppData%. What might this indicate?

  • Temporary installation logs

  • Legitimate Windows caching

  • Antivirus quarantine files

  • Data staging for exfiltration or payload unpacking

Question 6

A malware process creates a registry key under HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe. What does this suggest?

  • Keylogging activity

  • Network connection setup

  • Persistence mechanism

  • DLL injection attempt

Question 7

During analysis, a process is seen injecting code into another process. Which Windows API call might indicate this?

  • CreateRemoteThread()

  • GetModuleHandle()

  • RegOpenKeyEx()

  • CopyFileA()

Question 8

Which precaution should always be taken before performing dynamic malware analysis?

  • Enable internet access for realistic testing

  • Disable antivirus for execution freedom

  • Run the sample in an isolated sandboxed VM

  • Use your main system for faster performance

Question 9

In Process Monitor, which filter best helps identify registry persistence attempts?

  • Operation = “RegSetValue”

  • Operation = “CreateFile”

  • Path = “\Temp\”

  • Result = “SUCCESS”

Question 10

Why is RegShot used after running a malware sample for a short period?

  • To verify antivirus response

  • To detect registry or file system changes caused by malware

  • To monitor network connections

  • To extract metadata and version info

There are 10 questions to complete.

Take a part in the ongoing discussion