Decoded: The Cybersecurity Podcast

Part 9 - CEH v12 Practice Questions: Malware Threats and Analysis: 15 Questions


Listen Later

Part 9: Malware Threats and Analysis (15 Questions)


1. Which type of malware disguises itself as legitimate software to deceive users?

• A) Ransomware

• B) Spyware

• C) Trojan Horse

• D) Worm

Answer: C) Trojan Horse


2. What malware self-replicates without user intervention to spread across networks?

• A) Virus

• B) Worm

• C) Rootkit

• D) Spyware

Answer: B) Worm


3. Which malware encrypts a victim’s data and demands payment for decryption?

• A) Adware

• B) Ransomware

• C) Keylogger

• D) Spyware

Answer: B) Ransomware


4. What type of malware records a victim’s keystrokes to steal sensitive information?

• A) Adware

• B) Keylogger

• C) Rootkit

• D) Botnet

Answer: B) Keylogger


5. Which malware resides in a system’s kernel or firmware to maintain persistent access?

• A) Rootkit

• B) Worm

• C) Adware

• D) Trojan

Answer: A) Rootkit


6. Which malware exploits the Master Boot Record (MBR) to execute malicious code before the operating system loads?

• A) Fileless Malware

• B) Bootkit

• C) Worm

• D) Logic Bomb

Answer: B) Bootkit


7. Which type of malware embeds itself directly into system memory without creating permanent files?

• A) Rootkit

• B) Spyware

• C) Fileless Malware

• D) Ransomware

Answer: C) Fileless Malware


8. Which attack manipulates legitimate software to execute malicious code during runtime?

• A) DLL Injection

• B) Polymorphic Malware

• C) Ransomware

• D) Worm

Answer: A) DLL Injection


9. What technique allows malware to modify its code signature to evade detection?

• A) Obfuscation

• B) Polymorphism

• C) Heuristics

• D) Backdoor

Answer: B) Polymorphism


10. Which malware type connects infected devices to a central command-and-control (C2) server?

• A) Spyware

• B) Botnet

• C) Keylogger

• D) Adware

Answer: B) Botnet


11. What malware triggers malicious actions when predefined conditions are met?

• A) Rootkit

• B) Logic Bomb

• C) Worm

• D) Adware

Answer: B) Logic Bomb


12. Which of the following malware types is designed to generate unwanted advertisements?

• A) Spyware

• B) Ransomware

• C) Adware

• D) Trojan

Answer: C) Adware


13. What malware technique leverages PowerShell or WMI for stealth attacks without dropping executable files?

• A) Fileless Malware

• B) Rootkit

• C) Ransomware

• D) Botnet

Answer: A) Fileless Malware


14. Which attack method plants malicious code inside legitimate application updates?

• A) Supply Chain Attack

• B) Side-Channel Attack

• C) Zero-Day Attack

• D) Credential Stuffing

Answer: A) Supply Chain Attack


15. Which malware type encrypts data and demands ransom while threatening to leak sensitive information if payment isn’t made?

• A) Ransomware

• B) Scareware

• C) Cryptojacking

• D) Doxware

Answer: D) Doxware

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Up First from NPR by NPR

Up First from NPR

56,391 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,010 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

175 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

134 Listeners

David Bombal by David Bombal

David Bombal

25 Listeners