Decoded: The Cybersecurity Podcast

Part 9 - CEH v12 Practice Questions: Malware Threats and Analysis: 15 Questions


Listen Later

Part 9: Malware Threats and Analysis (15 Questions)


1. Which type of malware disguises itself as legitimate software to deceive users?

• A) Ransomware

• B) Spyware

• C) Trojan Horse

• D) Worm

Answer: C) Trojan Horse


2. What malware self-replicates without user intervention to spread across networks?

• A) Virus

• B) Worm

• C) Rootkit

• D) Spyware

Answer: B) Worm


3. Which malware encrypts a victim’s data and demands payment for decryption?

• A) Adware

• B) Ransomware

• C) Keylogger

• D) Spyware

Answer: B) Ransomware


4. What type of malware records a victim’s keystrokes to steal sensitive information?

• A) Adware

• B) Keylogger

• C) Rootkit

• D) Botnet

Answer: B) Keylogger


5. Which malware resides in a system’s kernel or firmware to maintain persistent access?

• A) Rootkit

• B) Worm

• C) Adware

• D) Trojan

Answer: A) Rootkit


6. Which malware exploits the Master Boot Record (MBR) to execute malicious code before the operating system loads?

• A) Fileless Malware

• B) Bootkit

• C) Worm

• D) Logic Bomb

Answer: B) Bootkit


7. Which type of malware embeds itself directly into system memory without creating permanent files?

• A) Rootkit

• B) Spyware

• C) Fileless Malware

• D) Ransomware

Answer: C) Fileless Malware


8. Which attack manipulates legitimate software to execute malicious code during runtime?

• A) DLL Injection

• B) Polymorphic Malware

• C) Ransomware

• D) Worm

Answer: A) DLL Injection


9. What technique allows malware to modify its code signature to evade detection?

• A) Obfuscation

• B) Polymorphism

• C) Heuristics

• D) Backdoor

Answer: B) Polymorphism


10. Which malware type connects infected devices to a central command-and-control (C2) server?

• A) Spyware

• B) Botnet

• C) Keylogger

• D) Adware

Answer: B) Botnet


11. What malware triggers malicious actions when predefined conditions are met?

• A) Rootkit

• B) Logic Bomb

• C) Worm

• D) Adware

Answer: B) Logic Bomb


12. Which of the following malware types is designed to generate unwanted advertisements?

• A) Spyware

• B) Ransomware

• C) Adware

• D) Trojan

Answer: C) Adware


13. What malware technique leverages PowerShell or WMI for stealth attacks without dropping executable files?

• A) Fileless Malware

• B) Rootkit

• C) Ransomware

• D) Botnet

Answer: A) Fileless Malware


14. Which attack method plants malicious code inside legitimate application updates?

• A) Supply Chain Attack

• B) Side-Channel Attack

• C) Zero-Day Attack

• D) Credential Stuffing

Answer: A) Supply Chain Attack


15. Which malware type encrypts data and demands ransom while threatening to leak sensitive information if payment isn’t made?

• A) Ransomware

• B) Scareware

• C) Cryptojacking

• D) Doxware

Answer: D) Doxware

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez