All Posts

Comptia Pentest+ 2023 Questions and answer - Part 26

Mary Mary Smith
03 Mar 2023
2 min
0

1. How can you mitigate a rainbow table attack?

A) Changing Default Password
B) Configuring Unpredictable Password
C) Password Salting
D) Password Hashing



2. Which of the following statement is the appropriate definition of malware?

A) Malware are Viruses
B) Malware are Malicious Software
C) Malware are Trojans
D) Malware are Infected Files



3. Which of the followings does not belong to a virus?

A) Replication
B) Propagation
C) Requires trigger to infect
D) Backdoor



4. Malware Static Analysis is _____________________.

A) Individual analysis of each file
B) Fragmentation of resources into a binary file for analysis without execution
C) Fragmentation of resources into a binary file for analysis with the execution
D) Sandboxing



5. Malware Dynamic Analysis is __________________.

A) Behavioral analysis of fragmented file without execution
B) Behavioral analysis with the execution of susceptible files
C) Behavioral analysis using IDA
D) Code analysis by fragmentation



1. Right Answer: B
Explanation: Password Salting is the process of adding additional character in the password to one-way function. This addition of characters makes the password more difficult to reverse the hash. One of the major advantage or primary function of Password Salting is to defeat the dictionary attacks and pre-computed attacks.

2. Right Answer: D
Explanation: Malware is abbreviated from the term Malicious Software. The term malware is an umbrella term; it defines a wide variety of potentially harmful software. This malicious software is specially designed for gaining access to target machines, stealing information and harming the target system.

3. Right Answer: B
Explanation: The virus is a self-replicating program; it is capable of producing multiple copies of itself by attaching with another program of any format. These viruses can be executed as soon as they are downloaded, it may wait for the host to execute them as well as be in sleep for a pre-determined perio The major characteristics of viruses are: § Infecting other Files § Alteration of Data § Transformation § Corruption § Encryption § Self-Replication

4. Right Answer: B
Explanation: Static Analysis or Code Analysis is performed by fragmenting the resources of the binary file without executing it and studying each component. Disassembler such as IDA is used to disassemble the binary file.

5. Right Answer: D
Explanation: Dynamic Analysis or Behavioral Analysis is performed by executing the malware on a host and observing the behavior of the malware. These behavioral analysis are performed in a Sandbox environment.

0 Comments
Leave a comment